Abstract:
An apparatus and method for displaying a copy-deterrent pattern (104) within a digital motion picture in order to discourage recording of the motion picture using a video camera or other sampling recording device. A copy-deterrent pattern (104) could be, for example, one or more symbols, a random pattern, a digital watermark or a text message (106). The copy-deterrent pattern (104) comprises a plurality of pixels within each frame of the digital motion picture, and the displayed pixel intensities are modulated at a temporal frequency using modulation characteristics deliberately selected to be imperceptible to human observers while simultaneously producing objectionable aliasing in any copy made using a video camera.
Abstract:
A print management system includes a policy (113) that determines a protection level for a document to be printed. The document is printed using forgery detection and deterrence technologies, such as fragile and robust watermarks, glyphs, and digital signatures, that are appropriate to the level of protection determined by the policy. A plurality of printers (130) are managed by a print management system (112). Each printer (130) can provide a range of protection technologies. The policy determines the protection technologies for the document to be printed. The print management system (112) routes the print job to a printer (130) that can apply the appropriate protections and sets the appropriate parameters in the printer. Copy evidence that can establish that a document is a forgery and/or tracing information that identifies the custodian of the document and restrictions on copying of the document and use of the information in the document are included in the watermark that is printed on the document. A document can be verified as an original or established as a forgery by inspecting the copy evidence and/or tracing information in the watermark.
Abstract:
In an image processing apparatus which has an operating system (102) and scanner driver (103), is connected to a scanner (104) for reading an original and converting it into an image signal, and stores image data read by manipulating the scanner (104), a forgery determination processing module (103-2) of the scanner driver (103) compares the read digital watermark data with specific image data to determine the matching degree, and an anti-forgery control module (106) controls predetermined image processing on the basis of the determination result for the image data read by the scanner driver (103).
Abstract:
A method of modifying the operation of the encoder function (2) and/or the decoder function (4) of a perceptual coding system in accordance with supplemental information, such as a watermark, so that the supplemental information may be detectable in the output of the decoder function. One or more parameters are modulated in the encoder function and/or the decoder function in response to the supplemental information.
Abstract:
Method and apparatus for 'copy-once' of a digital video signal uses a watermark in the video signal. The embedded watermark has two versions: one indicates copy-never and a second indicates copy-once, the difference being a single watermark bit. The watermark carries additional bits representing a digitized attribute (image characteristic) of a particular video frame of the video signal, for instance an average value of the amplitude of a video field. The frame whose attribute is carried in the watermark has a field (or frame) marker, which is a special signal located in the overscan portion of the frame. A compliant video recorder verifies the watermark and the copy-once bit (48, 54), extracts the associated attribute from the watermark (56), and compares (68) it to the measured attribute (58) of the marked video frame. Only if the extracted attribute value and the measured attribute value match, is recording enabled. During the recording process (70), the frame markers are stripped (72), preventing second generation copies of the recorded video signal, and the copy-once bit is set to copy-never.
Abstract:
In providing a system that can manage access to data to effectively prevent illegal access to the data or the like, there is provided a system for embedding access management information that prepares management information for managing access to the data, and embeds the management information in the data through data transformation without changing amount of data. In managing access to data, there is provided a method that extracts management information embedded in the data through data deformation without changing amount of data, and manages access to the data according to the extracted management information. There is also provided a method for changing management of access to the data according to the type of medium in which the data is stored (RAM or ROM). The management information further contains information for controlling recording of the data, reception of the data, playback of the data, interference of output of the data, duplication history of the data, or modification of the management information. The access management method can prevent illegal duplication of data or the like, and can effectively protect a work.
Abstract:
An apparatus for restricting a copy of digital information (20) is provided with: a detecting device (21, 22, 23, 24) for detecting a first watermark, which is buried in the digital information and comprises a first signal generated on the basis of a first rule; and a burying device (25, 26, 27) for burying a second watermark, which comprises a second signal generated on the basis of a second rule and having a structure different from that of the first signal, into the digital information if the first watermark is detected by the detecting device. A recording apparatus (100) is provided with: an inputting device (10) for inputting the digital information; the above mentioned copy restricting apparatus (20); and a recording device (50) for recording the digital information in which the second watermark is buried by said burying device.
Abstract:
In providing a system that can manage access to data to effectively prevent illegal access to the data or the like, there is provided a system for embedding access management information that prepares management information for managing access to the data, and embeds the management information in the data through data transformation without changing amount of data. In managing access to data, there is provided a method that extracts management information embedded in the data through data deformation without changing amount of data, and manages access to the data according to the extracted management information. There is also provided a method for changing management of access to the data according to the type of medium in which the data is stored (RAM or ROM). The management information further contains information for controlling recording of the data, reception of the data, playback of the data, interference of output of the data, duplication history of the data, or modification of the management information. The access management method can prevent illegal duplication of data or the like, and can effectively protect a work.
Abstract:
Methods, devices, systems, and non-transitory process-readable storage media for a watermark client executing on a media receiver device to manage access to data related to watermark data from broadcast streams. An embodiment method performed by a processor of the media receiver device may include operations for receiving a broadcast stream from a broadcast channel, identifying watermark data within the received broadcast stream, obtaining data via a wide area network based on the identified watermark data, receiving a request for the obtained data from a resident application executing on the media receiver device, and determining whether the resident application is eligible to access the obtained data.