Image analysis – Applications
Reexamination Certificate
2005-02-15
2005-02-15
Johns, Andrew W. (Department: 2621)
Image analysis
Applications
C341S082000
Reexamination Certificate
active
06856693
ABSTRACT:
In a watermarking system, an embedder embeds one of several alternative watermark patterns that represent the source message using side information to improve robustness. A detector uses normalized correlation to test all of the patterns, indicating that the source message is present if any one of the patterns is detected. The detection process results in a detection region that is the union of several disjoint cones, or a cone-forest, in media space.
REFERENCES:
patent: 6128736 (2000-10-01), Miller
patent: 6307949 (2001-10-01), Rhoads
patent: 6381341 (2002-04-01), Rhoads
Chen, B. et al., “Dither Modulation: A New Approach to Digital Watermarking and Information Embedding”,Proceedings of the SPIE: Security and Watermarking of Multimedia Contents, vol. 3657, pp. 342-353, 1999.
Moulin, P. et al., “Information-Theoretic Analysis of Information Hiding”,IEEE International Symposium on Information Theory, Boston, MA, Aug. 1998.
Chou, J. et al., “On the Duality Between Distributed Source Coding and Data Hiding”,Proceedings of Asilomar Converence, Nov. 1999.
Ramkumar, M., “Data Hiding in Multimedia—Theory and Applications”, Ph.D Thesis, New Jersey Institute of Technology, Kearny, NJ, Nov. 1999.
Eggers, J. et al., “A Blind Watermarking Scheme Based on Structured Codebooks”,JEE Secure Images and Image Authentication, London, UK, pp. 4/1-4/6, Apr. 2000.
Cox, I.J. et al., “Watermarking as Communications with Side Information”,Proceedings of the IEEE, vol. 87, No. 7, pp. 1127-1141, Jul. 1999.
Shannon, C.E., “Channels with Side Information at the Transmitter”,IBM Journal of Research and Development, pp. 289-293, 1958.
Miller, M.L. et al., “Informed Embedding: Exploiting Image and Detector Information During Watermark Insertion”, IEEE International Conference on Image Processing, Sep. 2000.
Cox, I.J. et al., “A Review of Watermarking and the Importance of Perceptual Modeling”,Proceedings of SPIE, Human Vision and Electronic Imaging II, vol. 3016, pp. 92-99, 1997.
Costa, M., “Writing on Dirty Paper”,IEEE Transactions on Information Theory, vol. 29, No. 3, pp. 439-441, 1983.
Pradhan, S.S. et al., “Distributed Source Coding Using Syndromes (DISCUS): Design and Construction”,Proceedings of the Data Compression Conference(DCC). Mar. 1999.
Miller, M.L. et al., “Computing the Probability of False Watermark Detection”,Proceedings of the Third International Workshop on Information Hiding, Dresden, Germany, 1999.
LandOfFree
Watermarking with cone-forest detection regions does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Watermarking with cone-forest detection regions, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Watermarking with cone-forest detection regions will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3490973