Watermarks carrying content dependent signal metrics for...

Image analysis – Applications

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

06512837

ABSTRACT:

TECHNICAL FIELD
The invention relates to multimedia signal processing, and in particular relates to hiding auxiliary information in media signals like audio, video and image signals, and using the auxiliary information to detect and characterize tampering of the signal.
BACKGROUND AND SUMMARY
Digital watermarking is a process for modifying physical or electronic media to embed a machine-readable code into the media. The media may be modified such that the embedded code is imperceptible or nearly imperceptible to the user, yet may be detected through an automated detection process. Most commonly, digital watermarking is applied to media signals such as images, audio signals, and video signals. However, it may also be applied to other types of media objects, including documents (e.g., through line, word or character shifting), software, multi-dimensional graphics models, and surface textures of objects.
Digital watermarking systems typically have two primary components: an encoder that embeds the watermark in a host media signal, and a decoder that detects and reads the embedded watermark from a signal suspected of containing a watermark (a suspect signal). The encoder embeds a watermark by altering the host media signal. The reading component analyzes a suspect signal to detect whether a watermark is present. In applications where the watermark encodes information, the reader extracts this information from the detected watermark.
Several particular watermarking techniques have been developed. The reader is presumed to be familiar with the literature in this field. Particular techniques for embedding and detecting imperceptible watermarks in media signals are detailed in the assignee's co-pending application Ser. No. 09/503,881 and U.S. Pat. No. 5,862,260, which are hereby incorporated by reference.
The invention provides methods and systems for detecting and characterizing alterations of media content, such as images, video and audio signals, using watermark messages to carry signal metrics. By comparing signal metrics extracted from the watermark to signal metrics calculated from a suspect signal, a watermark decoder can detect and even classify types of alterations to the watermarked signal. The watermark decoder localizes the alteration to a given block or set of blocks in the suspect image. To illustrate the alteration, the decoder may display a graphical depiction of the suspect signal, along with the block or blocks that are altered as well as the type of alteration associated with those blocks.
Further features will become apparent with reference to the following detailed description and accompanying drawings.


REFERENCES:
patent: 5617119 (1997-04-01), Briggs et al.
patent: 5646997 (1997-07-01), Barton
patent: 5721788 (1998-02-01), Powell et al.
patent: 5825892 (1998-10-01), Braudaway et al.
patent: 5841886 (1998-11-01), Rhoads
patent: 5933798 (1999-08-01), Linnartz
patent: 5974548 (1999-10-01), Adams
patent: 6064764 (2000-05-01), Bhaskaran et al.
patent: 6065119 (2000-05-01), Sandford, II et al.
patent: 6240121 (2001-05-01), Senoh
patent: 6246777 (2001-06-01), Agarwal et al.
patent: 6275599 (2001-08-01), Alder et al.
patent: 6285775 (2001-09-01), Wu et al.
patent: 1 041 815 (2000-10-01), None
Szepanski, W., “A Signal Teoretic Method for Creating Forgery-Proof Documents for Automatic Verification,”IEEE Proc. 1979 Carnahan Conf. on Crime Countermeasures, May 1979, pp. 101-109.*
Matthews, R., “When Seeing is not Believing,”New Scientist, No. 1895, Oct. 16, 1993, pp. 13-15.*
Friedman, G. L., “The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image,”IEEE Trans. Consumer Electronics, vol. 39, No. 4, Nov. 1993, pp. 905-910.*
Walton, S., “Image Authentication for a Slippery New Age,”Dr. Dobb's Journal, Apr. 1995, pp. 18-20, 22, 24, 26, 82 and 84-87.*
Schneider, M., “A Robust Content Based Digital Signature for Image Authentication, ”IEEE Proc. Int. Conf. on Image Processing, Sep. 1996, pp. 227-230 (vol. 3).*
Lin, C.-Y. et al., “Generating Robust Digital Signature for Image/Video Authentication,”Proc. Multimedia and Security Workshop at ACM Multimedia'98, Sep. 1998, pp. 49-54.*
Dittmann, J., “Chapter 3: Telltale Watermarking,” inMultiresolution Digital Watermarking: Algorithms and Implications for Multimedia Signals, Ph.D. thesis at Univ. of Toronto, 1999, pp. 23-52.*
Lin, C.-Y. et al., “Issues and Solutions for Authenticating MPEG Video,”Proc. SPIE vol. 3657: Security and Watermarking of Multimedia Contents, Jan. 1999, pp. 54-65.*
Xie, L. et al., “Secure MPEG Video Communications by Watermarking,”Proc. Conf. of ATIRP (Advanced Telecommunications and Information Distribution Research Project), Feb. 1999, pp. 459-462.*
Dittmann, J. et al., “Content-based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking,”IEEE Proc. Int. Conf. on Multimedia Computing and Systems, Jun. 1999, pp. 209-213.*
Lamy, P. et al., “Content-Based Watermarking for Image Authentication,”Proc. 3rdInt. Workshop on Information Hiding, Sep./Oct. 1999, pp. 187-198.*
Queluz, M. P. et al., “Spatial Watermark for Image Verification,”Proc. SPIE vol. 3971: Security and Watermarking of Multimedia Contents II, Jan. 2000, pp. 120-130.*
Sun, Q. et al., “VQ-based digital signature scheme for multimedia content authentication,”Proc. SPIE vol. 3971: Security and Watermarking of Multimedia Contents II, Jan. 2000, pp. 404-416.*
Xie, L. et al., “Methods for Soft Image/Video Authentication,”Proc. Conf. of ATIRP(Advanced Telecommunications and Information Distribution Research Project), Mar. 2000, 5 pages.*
Rey, C. et al., “Blind Detection of Malicious Alterations on Still Images using Robust Watermarks,”Proc. IEE Seminar on Secure Images and Image Authentication, Apr. 2000, pp. 7/1-7/6.*
Bassali et al., “Compression Tolerant Watermarking for Image Verification,”IEEE Proc. Int. Conf. on Image Processing, vol. 1, Sep. 2000 pp. 434-437.
Frequently Asked Questions, Epson Image Authentication System (IAS), Oct. 5, 1999, 3 pages.
U.S. Provisional application No. 60/180,364, Davis et al., filed Feb. 4, 2000.
U.S. Provisional application No. 60/198,138, Alattar, filed Apr. 17, 2000.
U.S. Provisional application No. 60/198,857, Davis et al., filed Apr. 21, 2000.
U.S. patent application No. 09/198,022, Rhoads, filed Nov. 23, 1998.
U.S. patent application No. 09/525,865, Davis et al., Mar. 15, 2000.
U.S. patent application No. 09/625,577, Carr et al., Jul. 25, 2000.
U.S. patent application No. 09/645,779, Tian et al., filed Aug. 24, 2000.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Watermarks carrying content dependent signal metrics for... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Watermarks carrying content dependent signal metrics for..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Watermarks carrying content dependent signal metrics for... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3021833

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.