Abstract:
Various improvements to steganographic systems, and applications therefore, are disclosed. The improvements include facilitating scale and rotation registration for steganographic decoding by use of rotationally symmetric steganographically embedded patterns and subliminal digital graticules; improved techniques for decoding without access to unencoded originals; improving robustness of steganographic coding in motion pictures and/or in the presence of lossy compression/decompression; and representing data (1690) by patterned bit cells (802) whose energy in the spatial domain facilitates decoding registration (1692). Applications include enhanced-security financial transactions, counterfeit resistant identification cards, fraud deterrent systems for cellular telephony, covert modem channels in video transmissions, photo duplication kiosks with automatic copyright detection, and hotlinked image objects (e.g., with embedded URLs) for use on the Internet.
Abstract:
Die Erfindung bezieht sich auf die möglichst zuverlässige Ermittlung von Käufern oder Gruppen von Käufern, die unerkannt Dokumente weitergeben, also Angreifern, die ihre Fingerabdrücke in elektronischen Dokumenten durch Vergleich der Unterschiede ermitteln und löschen. Um einer größeren Anzahl von Kopien und Zahl von kooperierenden Angreifern Rechnung zu tragen, werden im geometrischen Ordnungssystem die an der Manipulation beteiligten Angreifer eindeutig ermittelt, indem jeder Markierungsstelle im Dokument eindeutig ein Punkt des projektiven Raumes PG(d,q) von Hyperebenen mittels geheimer Funktion zugeordnet wird, jedem Fingerabdruck mindestens zwei Hyperebenen von PG(d,q) zugeordnet werden, von denen jede nur einem Fingerabdruck exklusiv zugeordnet wird, und zu jedem Fingerabdruck genau die Markierungsstellen markiert werden, die den Punkten der ausgewählten Hyperebenen entsprechen. Das erfindungsgemäße Verfahren eignet sich insbesondere für die Kennzeichnung von Kopien von Dokumenten, die dem Copyrightschutz unterliegen.
Abstract:
This invention provides a method for identifying a purchaser who purchased content from which an illegal copy was produced. A provider system (100) encrypts a content purchased by the purchaser using a public key of a purchaser system (200) and sends the encrypted content to the purchaser system. The purchaser system 200 creates a digital signature of the content with the use of a private key of its own and embeds the created digital signature into the received content. When an illegal copy is found, the provider system 100 verifies the digital signature, embedded in the illegal copy as a digital watermark, to identify the purchaser who purchased the content from which the illegal copy was produced.
Abstract:
Methods for adapting the operation of a system in response to the detection of embedded watermarks from a digital host content are provided. A digital host content is received and examined for the presence of watermarks. In response to the detection of embedded watermarks and in accordance with the value, type, density or spacing of the detected watermarks, one or more system reactions may take place. These reactions include conditionally allowing the system to resume its normal operation, prohibiting the system from resuming its normal operation, degrading the quality of the digital host content or changing the security status of the digital host content. In response to the extraction of weak watermarks that do not meet the desired system requirements, the extraction operation may be modified or extended to enable the detection of strong watermarks.
Abstract:
PROBLEM TO BE SOLVED: To control information leakage by outputting a security policy successively when an image processing apparatus reads a document with a restriction item such as copy prohibition embedded therein, and stores digitized data. SOLUTION: An image processing apparatus reads an original to which a restriction item such as copy restriction is embed to input image data. The image processing apparatus restricts an image processing on the input image data which involves a loss of the embedded information on the restriction item to maintain a state where the restriction item is embedded for the output. Alternatively, the image processing apparatus outputs the image data of a format where the restriction information is added to the input electric data. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
Methods for adapting the operation of a system in response to the detection of embedded watermarks from a digital host content are provided. A digital host content is received and examined for the presence of watermarks. In response to the detection of embedded watermarks and in accordance with the value, type, density or spacing of the detected watermarks, one or more system reactions may take place. These reactions include conditionally allowing the system to resume its normal operation, prohibiting the system from resuming its normal operation, degrading the quality of the digital host content or changing the security status of the digital host content. In response to the extraction of weak watermarks that do not meet the desired system requirements, the extraction operation may be modified or extended to enable the detection of strong watermarks.