Optimization methods for the insertion, protection, and detectio

Cryptography – Electric signal modification – Having production of printed copy

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 4, H04L 900

Patent

active

058898689

ABSTRACT:
The implementations of digital watermarks can be optimally suited to particular transmission, distribution and storage mediums given the nature of digitally-sampled audio, video and other multimedia works. Watermark application parameters can be adapted to the individual characteristics of a given digital sample stream. Watermark information can be either carried in individual samples or in relationships between multiple samples, such as in a waveform shape. More optimal models may be obtained to design watermark systems that are tamper-resistant given the number and breadth of existent digitized sample options with different frequency and time components. The highest quality of a given content signal may be maintained as it is mastered, with the watermark suitably hidden, taking into account usage of digital filters and error correction. The quality of the underlying content signals can be used to identify and highlight advantageous locations for the insertion of digital watermarks. The watermark is integrated as closely as possible to the content signal, at a maximum level to force degradation of the content signal when attempts are made to remove the watermarks.

REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4218582 (1980-08-01), Hellman et al.
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4424414 (1984-01-01), Hellman et al.
patent: 4748668 (1988-05-01), Shamir et al.
patent: 4908873 (1990-03-01), Philibert et al.
patent: 4979210 (1990-12-01), Nagata et al.
patent: 4980782 (1990-12-01), Ginkel
patent: 5073925 (1991-12-01), Nagata et al.
patent: 5287407 (1994-02-01), Holmes
patent: 5319735 (1994-06-01), Preuss et al.
patent: 5365586 (1994-11-01), Indeck et al.
patent: 5379345 (1995-01-01), Greenberg
patent: 5408505 (1995-04-01), Indeck et al.
patent: 5412718 (1995-05-01), Narasimhalu et al.
patent: 5428606 (1995-06-01), Moskowitz
patent: 5506795 (1996-04-01), Yamakawa
patent: 5680462 (1997-10-01), Miller et al.
patent: 5696828 (1997-12-01), Koopman, Jr.
patent: 5740244 (1998-04-01), Indeck et al.
patent: 5745569 (1998-04-01), Moskowitz et al.
patent: 5751811 (1998-05-01), Magnotti et al.
patent: 5757923 (1998-05-01), Koopman, Jr.
First International Workshop, Cambridge, U.K., 30 May to 1 Jun. 1996, Joshua R. Smith and Barrett O. Comiskey: Modulation and Information Hiding in Images, Springer Verlag, pp. 207-227.
SPIE-EI97, vol. 3022, Martin Kutter et al.: Digital Signature of Color Images Using Amplitude Modulation, pp. 518-527.
SPIE-96 Proceedings, vol. 2915, Mar. 1997, Joan Puate & Fred Jordan: Using Fractal Compression Scheme to Embed a Digital Signature into an Image, pp. 108-118.
1996 IEEE Int. Conf. on Multimedia Computing and Systems, Jun. 17-23, Hiroshima, Japan, Laurence Boney et al.: Digital Watermarks for Audio Signals, pp. 473-480.
Proceedings of EUSIPCO-96, Eighth European Signal Processing Conference, Trieste, Italy, 10-13 Sep. 1996, Laurence Boney et al.: Digital Watermarks for Audio Signals, 5 pp.
Proc. of the 1996 IEEE Int. Conf. on Image Processing, vol. III, Mitchell D. Swanson et al.: Transparent Robust Image Watermarking, 1996, pp. 211-214.
7th IEEE Digital Signal Processing workshop, Sep. 1-4, 1996, Loen, Norway, Mitchell D. Swanson et al.: Robust Data Hiding for Images, pp. 37-40.
NEC Research Institute, Technical Report 95-10, I.J. Cox et al.: Secure Spread Spectrum Watermarkings for Multimedia, 33 pp.
Proceedings of the KnowRight'95 Conference, J. Zhao, E. Koch: Embedding Robust Labels into Images for Copyright Protection, pp. 242-251.
1995 IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, Jun. 1995, E. Kock, J. Zhao: Towards Robust and Hidden Image Copyright Labeling, 4 pp.
Department of Electrical Engineering, Information Theory Group, Delft University of Technology, Delft, The Netherlands, G.C. Langelaar et al.: Copy Protection for Multimedia Data based on Labeling Techniques, Jul. 1996, 9 pp.
IEEE International Computer Processing Conference, Austin, Texas, Nov. 13-16, 1994, R.G. van Schyndel et al.: A digital Watermark, pp. 86-90.
Second Asian Image Processing Conference, Singapore, Dec. 6-8, 1995, vol. 2, R.G. van Schyndel et al.: Towards a Robust Digital Watermark, pp. 504-508.
DICTA'95, University of Queensland, Brisbane, Dec. 5-8, 1995, A.Z. Tirkel et al.: A Two-Dimensional Digital Watermark, 7 pp.
ISSSTA'96, Sep. 1996, Mainz, Germany, A.Z. Tirkel: Image Watermarking--A Spread Spectrum Application, 6 pp.
IEE Proceedings, vol. 143, No. 4, Aug. 1996, J.J.K. O Ruanaidh et al.: Watermarking Digital Images for Copyright Protection, pp. 250-256.
SPIE vol. 2952, EOS Series, Symposium on Advanced Imaging and Network Technologies, Berlin, Germany, Oct. 1996, F. Hartung and B. Girod: Digital Watermarking of Raw and Compressed Video, pp. 205-213.
Press, Flannery, Teukolsky and Vetterling, "Numerical Recipes in C", Cambridge University Press, 1988, 12. Fourier Transform Spectral Methods, pp. 398-470.
Pohlmann, Ken C., "Principles of Digital Audio", Third Edition, 1995, pp. 32-37, 40-48, 138, 147-149, 332, 333, 364, 499-501, 508-509, 564-571.
Pohlmann, Ken C., "Principles of Digital Audio", Second Edition, 1991, pp. 1-9, 19-25, 30-33, 41-48, 54-57, 86-107, 375-387.
Schneier, B., "Applied Cryptography", John Wiley & Sons, Inc., New York 1994, particulary the following sections for steganography: 4.1 Subliminal Channel, pp. 66-68, 16.6 Subliminal Channel, pp. 387-392, particularly the following sections for crytography Chapter 1: Foundations, pp. 1-16, Chapter 2: Protocol Building Blocks, pp. 17-41, Chapter 3: Basic Protocols, pp. 42-57. Chapter 12.1: Public-Key Algorithms Background, pp. 273-275, Chapter 14.1: One-Way Hash Functions, Background, pp. 321-324.
Kahn, D., "The Code Breakers", The Macmillan Company, 1969, particularly the following sections on steganography pp. xiii, 81-83, 513, 515, 522-526, 873.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Optimization methods for the insertion, protection, and detectio does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Optimization methods for the insertion, protection, and detectio, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Optimization methods for the insertion, protection, and detectio will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1221967

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.