Robust watermarking for digital objects

Image analysis – Applications

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

06463162

ABSTRACT:

BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention deals with the process of watermarking digital objects such as still images, video, multimedia, and sound.
2. Art Background
Watermarks are methods for identification or authentication, such as watermarked paper showing a logo or design. In the digital arts, watermarking refers to processes by which the watermark, identifying or authenticating data, is embedded in a digital object, or the mark is extracted from a digital object. Watermarking is used in copyright protection as a means of identifying ownership and enabling the detection of copies and derivatives.
In the case of watermarking still images, most published methods use the watermark to manipulate the amplitude of pixel values directly in the pixel domain. For example, U.S. Pat. No. 5,530,751 to Morris embeds a digital watermark in an object by manipulating the amplitude of selected digital samples of the object. This approach is also used in U.S. Pat. No. 5,636,292 to Rhoads. “Protecting Publicly-Available Images with an Invisible Watermark” by Gordon W. Braudaway, IEEE International Conference on Image Processing, Santa Barbara, October 1997 discloses a method of multiplying the amplitude of the image by the watermark. Such systems that vary the amplitude of the image are vulnerable to additive noise, and are also vulnerable to attack. Other systems, such as “Adaptive Watermarking in the DCT Domain” by Bo Tao & Bradley Dickinson, IEEE Conference on ASSP, April 1997; “Towards Robust and Hidden Image Copyright Labeling” by E. Koch & J. Zhao, Proceedings of 1995 IEEE Workshop on Nonlinear Signal and Image Processing (Neos Marmaras, Halkidiki, Greece, Jun. 20-22, 1995), pp. 452-455; and “Image Watermarking Using DCT Domain Constraints” by A. Bors and I. Pitas, 1996 EEEE International Conference on Image Processing (ICIP'96), Lausanne, Switzerland, vol. III, pp. 231-234, Sep. 16-19, 1996, disclose techniques for embedding watermarks by enforcing constraints on the ordering or differences of transform values, typically block Discrete Cosine Transforms (DCT). While these systems are more resistant to noise, they are not resistant to other operations such as cropping and scaling as they depend on accurate registration with the original image. The method disclosed in “Phase Watermarking of Digital Images” by J. J. K. O Ruanaidh, W. J. Dowling and F. M. Boland, IEEE International Conference on Image Processing, Vol. III pp. 239-241, Lausanne, Switzerland, September 1996 hides the watermark in the phase of the DCT; the computational complexity and numerical errors involved in this approach are undesirable, and the phase is extremely susceptible to translations of the original image.
As noted, methods that include a watermark by manipulating pixel amplitudes are susceptible to noise and are vulnerable to attempts at removal. If the watermark is highly correlated, such as a company logo, it will often be visible in the watermarked image. The block DCT methods are susceptible to image translations. A watermarking scheme should result in an invisible or imperceptible mark even when the watermark itself is highly correlated, be difficult to intentionally remove, and be robust to common image transformations such as compression including lossy compression, JPEG compression, requantization, contrast enhancement, brightness variation, conversion to gray scale, blurring, and sharpening.
SUMMARY OF THE INVENTION
In a first embodiment of the present invention, watermark information is incorporated in a digital object by including the watermark in the argument of a transform of the image. By using the watermark to perform argument modulation of the object in the transform domain, rather than modifying the amplitude of the image, the resulting watermarked image is more robust and resistant to attack. A second embodiment of the present invention discloses an additional method of argument modulation. A third embodiment combines the watermarking process with lossy compression. In all embodiments the argument modulation process results in a loss of information, thus making the watermarked object less vulnerable to intentional attack.


REFERENCES:
patent: 5530751 (1996-06-01), Morris
patent: 5530759 (1996-06-01), Braudaway et al.
patent: 5568570 (1996-10-01), Rabbani
patent: 5636292 (1997-06-01), Rhoads
patent: 5689587 (1997-11-01), Bender et al.
patent: 5721788 (1998-02-01), Powell et al.
patent: 5734752 (1998-03-01), Knox
patent: 5768426 (1998-06-01), Rhoads
patent: 5832119 (1998-11-01), Rhoads
patent: 5850481 (1998-12-01), Rhoads
patent: 5862260 (1999-01-01), Rhoads
patent: 5915027 (1999-06-01), Cox et al.
patent: 5930369 (1999-07-01), Cox et al.
patent: 5946414 (1999-08-01), Cass et al.
patent: 5949055 (1999-09-01), Fleet et al.
patent: 6086706 (2000-07-01), Brassil et al.
Szepanski Wolfram, “A Signal Theoretic Method for Creating Forgery-Proof Documents For Automatic Verification”, 1979 Carnahan Conference On Crime CounterMeasures, pp. 101-109, May 16-18, 1979.*
Zhao et al., “Embedding Robust Labels into Images For Copyright Protection”, Proc of International, Aug. 1995.*
Congress on Intellectual Property Rigths for Specialized Information, Knowledge and New Technologies, pp. 1-10.*
Bors et al., Embedding Parametric Digital Signatures in Images, Dept. of Informatics, Univ. of Thessaloaiks, pp. 1-9, Sep. 1996.*
Matsui et al., “Video-Steganography: How to Secretly Embed a Signature in a Picture”, IMA Intellectual Property Project Proceedings, vol. 1, Issue 1, pp. 187-206, Jan. 1994.*
Duan et al., “Intra-Block Algorithm for Digital Watermarking” IEEE Proc. 14th Int. Conf. on Pattern Recognition, Aug. 16-20, 1998, pp. 1589-1591.*
Puate et al. Using Fractal compression scheme to embed a digital signature into an image, Proc. SPIE vol. 2915: Video Techniques & Software for full-Service Networks, pp. 1-12, Aug. 1997.*
Boland et al., “Watermarking digital images for copyright protection”, Image processing and its application Conference, Jul., 4-6, 1995, pp. 326-330.*
Ogihara et al., “Data embedding into pictorial images with less distortion using discrete cosine transform”, Proc. of the 13thInt. Conf. on Pattern Recogntion, Aug., 25-29, 1996, pp. 675-679.*
Ó Ruanaidh et al., “Watermarking digital images for copyright protection”, IEE Proc.-Vis. Image Signal Process., vol. 143, No. 4, Aug. 1996, pp. 250-256.*
Ó Ruanaidh et al., “Phase watermarking of digital images”, Int. Conf. on Image Proc., vol. III, 16-19, Sep. 1996, pp. 239-242.*
Borç et al., “Image watermarking using DCT domain constraints”, Proc. IEEE Int. Conf. on Image Processing, Sep. 16-19, 1996, pp. 232-234.*
Hsu et al., “Hidden signatures in images”, Proc. IEEE Int. Conf. on Image Processing, Sep. 16-19, 1996, pp. 223-226.*
Borç et al., “Embessing parametric digital signatures in images”, European Conf. on Signal Processing, Sep. 1996, pp. 1701-1704.*
Podichuk et al., “Perceptual watermarking of still images”, Proc. IEEE 1stWorkshop on Multimedia Signal Processing, Jun. 23-25, 1997, pp. 363-368.*
Barni et al., “Robust watermarking of still images for copyright protection”, Proc. 13thInt. Conf. on Digital Signal Processing, Jul. 2-4, 1997, pp. 499-502.*
Silvestre et al., “Image watermarking using digital communication techniques”, Proc. 6thInnt. conf. oon Image Processing and it's Applications, Jul. 14-17, 1997, pp. 443-447.*
Tang et al., “A DCT-based coding of images in watermarking”, Int. Conf. on Inf., Comm. and Sig. Proc., ICIC'97, Singapore, Sep. 9-12, 1997, pp. 510-512.*
Ó Ruanaidh et al. (“Rotation, scale and translation invariant digital image watermarking”, Proc. IEEE Int. Conf. on Image Processing, Oct. 26-29, 1997, pp. 536-539.*
Swanson et al., “Data hiding for video-in-video”, Proc. Int. Conf. on Image Processing, Oct. 26-29, 1997, pp. 676-679.*
Cox et al., “Secure spread spectrum watermarking for multimedia”, IEEE Trans. on Image Processing, vol. 6, No. 12, Dec. 1997.*
A. Bors and I. Pitas, “Image Watermarking Using DCT Domain Constraints”, 1996 IEEE Conference on Image Processing (

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Robust watermarking for digital objects does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Robust watermarking for digital objects, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Robust watermarking for digital objects will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2944625

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.