Steganographic decoding with transform to spatial domain

Image analysis – Applications

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

06813366

ABSTRACT:

FIELD OF THE INVENTION
The present invention relates to tracking watermarked materials (such as image data-including video and graphics data-and sound files) as they are disseminated on the Internet.
BACKGROUND AND SUMMARY OF THE INVENTION
Distribution of imagery (including, e.g., graphics and video) and audio on the Internet is quick and simple. While advantageous in most respects, this ease of distribution makes it difficult for proprietors of such materials to track the uses to which their audio/imagery/graphics/video are put. It also allows such properties to be copied illicitly, in violation of the proprietors' copyrights.
The present invention seeks to redress these drawbacks by monitoring Internet dissemination of various properties, and reporting the results back to their proprietors. If an unauthorized copy of a work is detected, appropriate steps can be taken to remove the copy, or compensate the proprietor accordingly.
In accordance with one embodiment of the present invention, a monitoring system downloads various image files (including video or graphic files) or audio files over the Internet, and identifies some as having embedded digital watermark data. The system decodes such watermark data and, from the decoded data, determines the proprietor of each file. The proprietors are then alerted to the results of the monitoring operation, sometimes informing them about otherwise unknown distribution of their image/audio properties.
In some embodiments, the proprietorship is determined by reference to a registry database, in which a watermarked identification code is associated with textual information identifying the proprietor of a work.
In some embodiments, various types of screening operations can be applied to the downloaded files to identify those most likely to contain embedded watermark data, so that complete watermark detection operations are performed only on a subset of the downloaded files.
The foregoing and other features and advantages will be more readily apparent from the following detailed description, which proceeds with reference to the accompanying drawings.


REFERENCES:
patent: 3914877 (1975-10-01), Hines
patent: 4163258 (1979-07-01), Ebihara et al.
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4677466 (1987-06-01), Lert, Jr. et al.
patent: 4682301 (1987-07-01), Horiba et al.
patent: 4736307 (1988-04-01), Salb
patent: 4777620 (1988-10-01), Shimoni et al.
patent: 4843631 (1989-06-01), Steinpichler et al.
patent: 4941185 (1990-07-01), Reed
patent: 5040059 (1991-08-01), Leberl
patent: 5091966 (1992-02-01), Bloomberg et al.
patent: 5131059 (1992-07-01), Kobayashi et al.
patent: 5469222 (1995-11-01), Sprague
patent: 5646997 (1997-07-01), Barton
patent: 5652626 (1997-07-01), Kawakami et al.
patent: 25038 (1993-12-01), None
Tanaka et al., Embedding Secret Information into a Dithered Multi-level Image, IEEE, pp. 216-220, 1990.*
Tanaka et al., A Visual Retrieval System with Private Information for Image Database, Proc. Int'l Conf. on DSP Appl. & Tech., pp. 415-421, Oct. 1991.*
Zhao et al. “Embedding Robust Labels into Images for Copyright Protection”. Proc. Int'l Congress Intellectual Prop., pp. 1-10, Aug. 1995.*
Bors et al., Embedding Parametric Digital Signatures in Images, 4 pages.*
Sheng et al., “Experiments on pattern recognition using invariant Fourier-Mellin descriptors”, Journal Optical Society of America, Vo. 3, No. 6, Jun. 1986, pp. 771-776.*
Short, Kevin M., “Steps toward unmasking secure communications”, International Journal of Bifurcation and Chaos, vol. 4, No. 4, 1994, pp. 959-977.*
Matsui et al., “Video-Steganography: How to Secretly Embed a Signature in a Picture”, IMA, vol. 1, No. 6, pp. 187-205, Jan. 1994.*
Sheng et al., “Experiments on pattern recognition using invariant Fourier-Mellin descriptors”, J. Opt. Soc. Am. vol. 3, No. 6, pp. 771-776, Jun. 1986.*
Nakamura et al. “A Unified Coding Method of Dithered Image and Text Data Using MicroPatterns”, Elec. & Comm. Top. , Part 1, vol. 72, No. 4, pp. 56-60, 1989.*
Nakamura et al. A Unified Coding Method of Image and Text Data Using Discrete Orthogonal Transform, Sys. & Comp. Top. vol. 21, No. 3, pp. 87-92, 1990.*
Komatsu et al., “Authentication System Using Concealed Image in Telematics,” Memoirs of the School of Science & Engineering, Waseda Univ., No. 52, 1988, pp. 45-60.
Tanaka, “Embedding the Attributed Information Into a Dithered Image,” Systems and Computers in Japan, vol. 21, No. 7, 1990, pp. 43-50.
Komatsu et al., “A Proposal on Digital Watermark in Document Image Communication and Its Application to Realizing a Signature,” Electronics and Communications in Japan, Part 1, vol. 73, No. 5, 1990, pp. 22-33.
Tanaka et al., “New Integrated Coding Schemes for Computer-Aided Facsimile,” Proc. IEEE Int'l Conf. on Sys. Integration, Apr. 1990, pp. 275-281.
JPEG Group's JPEG Software (release 4), ftp.csua.berekeley.edu/pub/cypherpunks/applications/jsteg/jpeg.announcement.gz, Jun. 7, 1993, 2 pages.
Franz et al., “Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography are Nonsense, at Best,” Information Hiding, First Int. Workshop Proc, May 30-Jun.1, 1996, pp. 7-21, (a counterpart was published in German by Steffen Moller et al in 1994).
Bruckstein, A.M.; Richardson, T.J., A holographic transform domain image watermarking method, Circuits, Systems, and Signal Processing vol. 17, No. 3, p. 361-89, 1998. This paper includes an appendix containing an internal memo of Bell Labs, which according to the authors of the paper, was dated Sep. 1994.
Dautzenberg, “Watermarking Images,” Department of Microelectronics and Electrical Engineering, Trinity College Dublin, 47 pages, Oct. 1994.
Koch et al., “Copyright Protection for Multimedia Data,” Proc. of the International Conference on Digital Media and Electronic Publishing, Dec. 6-8, 1994, Leeds, U.K., 15 pages.
Quisquater, J., “Access Control and COpyright Protection for Images, Conditional Access and Copyright Protection Based on the Use of Trusted Third Parties,” 1995, 43 pages.
“Access Control and COpyright Protection for Images, WorkPackage 3: Evaluation of Existing Systems,” Apr. 19, 1995, 68 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Steganographic decoding with transform to spatial domain does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Steganographic decoding with transform to spatial domain, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Steganographic decoding with transform to spatial domain will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3304536

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.