Abstract:
This invention relates to a method and an arrangement for embedding auxiliary data in an information signal. Only a part of a noise signal representing the auxiliary data is embedded but the complete noise signal may be detecting. This allows for a greater payload of the embedded signal. The invention also relates to a corresponding method and arrangement for detecting auxiliary data in an information signal.
Abstract:
An image data encoding system is disclosed, that comprises a discrete cosine transforming means for discrete-cosine transforming the original image, an electronic watermark data embedding means for embedding the electronic watermark data in the data that has been transformed by the discrete cosine transforming means, and a data selecting means for selecting the output signal of the discrete cosine transforming means or the output signal of the electronic watermark data embedding means. Another image data encoding system is also disclosed, that comprises an electronic watermark embedding means for embedding electronic watermark data selected from a plurality of types of electronic watermark data to the digital image data, wherein at least one of the plurality of types of electronic watermark data is predetermined electronic watermark data that does not affect the digital image data even if the electronic watermark data is embedded in the digital image data.
Abstract:
An image data encoding system has a discrete cosine transformer for discrete cosine transforming the original image, an electronic watermark data embedding circuit for embedding the electronic watermark data in the data that has been transformed by the discrete cosine transformer, and a data selector for selecting the output signal of the discrete cosine transformer or the output signal of the electronic watermark data embedding circuit. Another image data encoding system has an electronic watermark embedding circuit for embedding electronic watermark data selected from a plurality of types of electronic watermark data to the digital image data, wherein at least one of the plurality of types of electronic watermark data is predetermined electronic watermark data that does not affect the digital image data even if the electronic watermark data is embedded in the digital image data.
Abstract:
The present invention is directed to a method of deterring the illicit copying of electronically published documents. It includes utilizing a computer system to electronically publish a plurality of copies of a document having electronically created material thereon for distribution to a plurality of subscribers and operating programming within the computer system so as to perform the identification code functions. The steps are to encode the plurality of copies each with a separate, unique identification code, the identification code being based on a unique arrangement of the electronically created material on each such copy; and, creating a codebook to correlate each such identification code to a particular subscriber. In some embodiments, decoding methods are included with the encoding capabilities. The unique arrangement of the electronically created material may be based on line-shift coding, word-shift coding, or feature enhancement coding (or combinations of these) and may be effected through bitmap alteration of document format file alteration.
Abstract:
A watermarking procedure wherein each of a set of copies of the work has a slightly-modified form of a "baseline" watermark that is placed within a critical region of the data. The slight variations in the watermarks, however, are not perceptually visible and do not interfere with the work. If multiple persons collude to attempt to create an "illicit" copy of the work (i.e., a copy without a watermark), however, at least one of the modified watermarks is present in the copy, thereby identifying both the illicit copy and the copier.
Abstract:
A method is provided that deters the illicit copying of electronically published documents. It includes publishing a plurality of copies of electronically created material to be distributed to a plurality of subscribers. Each copy of subscriber's document has a unique identification code embedded in the document. The arrangement of the code on the document is based on the line-shifting and word-shifting techniques. This is to minimize the effects from noise and distortions on future illicit copies to simplify detection and decoding of the unique code. A codebook is created to correlate each unique code with each subscriber.
Abstract:
The present invention relates to a method for certifying and subsequently authenticating original physical or digital documents. The concept of the evidence lies in the dual nature of a physical information item and a digital information item, one being the reference for the other that cannot be amended at the risk of the evidence being lost. For a physical original document (8) associated with a bubble seal (7) there is a corresponding time-and-date-stamped, proprietary paperless reference counterpart. For a time-and-date-stamped, proprietary digital original document (15) there is a corresponding reference counterpart in the form of a bubble seal (7).
Abstract:
A system for watermarking and distributing material includes a data processing apparatus, which operates as a watermark encoder. The data processing apparatus is operable to process an original material item to form a reduced-bandwidth-version of the material item, marked with a code word from a predetermined set of code words. The data processing apparatus is operable to form an impaired version of the material item from which a marked representation of the original material item can be formed. The impaired version is formed by subtracting the reduced-bandwidth-version of the material item from a copy of the original material item. As such, the impaired version can be mass distributed, but a representation of the original material item cannot be formed without the reduced-bandwidth-version of the material item. By watermarking the reduced-bandwidth-versions, a representation of the material item, formed by combining one of the marked reduced-bandwidth-versions with the impaired material item, can be uniquely identified. However, only a low bandwidth part of the material item need be watermark encoded, which is more easily distributable to individual recipients than watermarked copies of the original material item.
Abstract:
A method for detecting an embedded code which is embedded in a predetermined content and concatenates a plurality of component codes, comprising the steps of:
dividing the embedded code into the plurality of component codes; decoding each of the component codes divided, thereby to obtain a plurality of residues pairs each comprising two residues, taking a plurality of integers which are predetermined and are relatively prime to each other, as moduli, the plurality of integers being inputted from a modulus storage section which stores k' different relatively prime numbers p i (i=1,2,...,k'), and calculating a user identification number of a colluder who made a collusion attack on the content, from the plurality of residue pairs, wherein the plurality of component codes are component codes that have a possibility to have a method of decoding at least one of the residues with respect to the user identification number of the colluder.