Image analysis – Applications
Reexamination Certificate
2000-02-10
2001-09-11
Johns, Andrew W. (Department: 2621)
Image analysis
Applications
C380S252000
Reexamination Certificate
active
06289108
ABSTRACT:
FIELD OF THE INVENTION
The present invention relates to discerning alteration of data objects, such as images or audio.
BACKGROUND AND SUMMARY OF THE INVENTION
The adage “photos don't lie” is no longer reliable. The advent of digital editing tools makes it relatively easy to move, add, or delete features from photographs. Other digital content is similarly susceptible to alteration.
In accordance with a preferred embodiment of the present invention, this problem is at least partially overcome by providing a photograph with supplemental data. This supplemental data is below a threshold of human perception (e.g., is essentially invisible) yet can extend throughout the image. (In some embodiments the supplemental data is adaptively scaled to correspond to characteristics of the associated image.) If a version of the image is thereafter encountered with the supplemental data missing or attenuated, the image is known to have been altered. By reference to such supplemental data, it is often possible to identify particular regions within the image that have been altered.
The foregoing and additional features of the invention will be more readily apparent from the following detailed description, which proceeds with reference to the accompanying drawings.
REFERENCES:
patent: 3004104 (1961-10-01), Hembrooke
patent: 5027421 (1991-06-01), Kanno
patent: 5319453 (1994-06-01), Copriviza et al.
patent: 5379345 (1995-01-01), Greenberg
patent: 5499294 (1996-03-01), Friedman
patent: 5646997 (1997-07-01), Barton
patent: 5652626 (1997-07-01), Kawakami et al.
patent: 5721788 (1998-02-01), Powell et al.
patent: 5857038 (1999-01-01), Owada et al.
patent: 29 43 436 A1 (1981-05-01), None
patent: 0 629 972 A2 (1994-12-01), None
Szepanski, “A Signal Theoretic Method for Creating Forgery-Proof Documents For Automatic Verification,” IEEE Proc. 1979 Carnahan Conf. on Crime Countermeasures, May 16-18, 1979, pp. 101-109.*
Wagner, “Fingerprinting, ” IEEE Proc. Symp. on Security and Privacy, Apr. 1983, pp. 18-22.*
Friedman, “The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image,”IEEE Trans. on Consumer Electronics, vol. 39, No. 4, Nov. 1993, pp. 905-910.*
Szepanski, “Compatibility Problems in Add-On Data Transmission for TV-Channels,” 2d Symp. and Tech. Exh. On Electromagnetic Compatibility, Jun. 28, 1977, pp. 263-268.
Szepanski, “Optimization of Add-On Signals by Means of a Modified Training Algorithm for Linear Classifiers,” IEEE Int'l Symp. On Info. Theory, Oct. 10, 1977, pp. 27-28.
Szepanski, “Binary Data Transmission Over Video Channels with Very Low Amplitude Data Signals,”Fernseh- und Kino-Technik, vol. 32, No. 7, Jul., 1978, pp. 251-256. (German text with full English translation.).
Szepanski, Additive Binary Data Transmission for Video Signals, Conference of the Communications Engineering Society, 1980,NTG Technical Reports, vol. 74, pp. 343-351. (German text with full English translation.).
Komatsu et al., “Authentication System Using Concealed Image in Telematics,”Memoirs of the School of Science&Engineering, Waseda Univ., No. 52, 1988, pp. 45-60.
Tanaka, “Embedding the Attribute Information Into a Dithered Image,”Systems and Computers in Japan, vol. 21, No. 7, 1990, pp. 43-50.
Komatsu et al., “A Proposal on Digital Watermark in Document Image Communication and Its Application to Realizing a Signature,”Electronics and Communications in Japan, Part 1, vol. 73, No. 5, 1990, pp. 22-33.
Tanaka et al., “Embedding Secret Information Into a Dithered Multi-Level Image,” Proc. IEEE Military Comm. Conf., Sep. 1990, pp. 216-220.
Tanaka et al., “A Visual Retrieval System with Private Information for Image Database,” International Conference on DSP Applications and Technology, Oct. 1991, pp. 415-421.
Kurak et al., “A Cautionary Note On Image Downgrading, ” Nov. 30, 1992 IEEE, pp. 153-159.
JPEG Group's JPEG Software (release 4), FTP.CSUA.Berekeley.edu/Pub/Cypherpunks/Applications/JSTEG/JPEG.Announcement.GZ, Jun. 7, 1993, 2 pages.
Caronni, “Assuring Ownership Rights for Digit Images,” Published in the Proceedings of ‘Reliable IT Systems,’ VIS '95, HH. Brüggemann and W. Gerhardt-Häckl (Ed.), Vieweg Publishing Company, Germany, 1995, Jun. 14, 1994, 10 pages. (Originally published as an ETH (Zurich) Technical Report, “Ermitteln Unauthorisierter Verteiler von Maschinenlesbaren Daten,” 8/93.
Machado, “Announcing Stego 1.0a2, The First Steganography Tool for the Macintosh,” Internet reference, Nov. 28, 1993, 3 pages.
Tirkel et al, “Electronic Water Mark,” DICTA-93, Macquarie University, Sydney, Australia, Dec., 1993, pp. 666-673.
Bruyndonckx et al., “Spatial Method for Copyright Labeling of Digital Images,” preprint dated 1994; published in IEEE Workshop on Nonlinear Images/Signal Processing, Thessaloniki, Greece, Jun. 1995, Proceedings, pp. 456-459.
Franz et al., “Computer Based Steganography: How It Works and Why Therfore Any Restrictions on Cryptography are Nonsense, at Best,” Information Hiding, First Int. Workshop Proc, May 30-Jun. 1, 1996, pp. 7-21, (a counterpart was published in German by Steffen Moller et al in 1994).
Möller, et al., “Rechnergestutzte Steganographie: Wie sie Funktioniert und warum folglich jede Reglementierung von Verschlusselung unsinnig ist,” (with English abstract),Datenschutz und Datensicherung, 18/6 (1994) 318-326.
Sapwater et al., “Electronic Copyright Protection,” PHOTO>Electronic Imaging, vol. 37, No. 6, 1994, pp. 16-21.
Proudler, Graeme J., “Authentication and Display of Signatures on Electronic Documents,” 2244 Research Disclosure, Feb. 1994, No. 358, Emsworth, GB, 1 page.
Brown, “S-Tools for Windows, version 1.00; What is Steganography,” Internet reference, Mar. 6, 1994, 6 pages.
Nakamura et al., “A Unified Coding Method of Dithered Image and Text Data Using Micropatterns,”Electronics and Communications in Japan, Part 1, vol. 72, No. 4, 1989, pp. 50-56.
Conwell William Y.
Digimarc Corporat.
Digimarc Corporation
Johns Andrew W.
LandOfFree
Methods for detecting alteration of audio and images does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods for detecting alteration of audio and images, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods for detecting alteration of audio and images will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2540624