Abstract:
An image data encoding system is disclosed, that comprises an electronic watermark embedding means (404) for embedding electronic watermark data selected from a plurality of types (408(0),...,408(n)) of electronic watermark data to the digital image data (401), wherein at least one of the plurality of types (408(0),...,408(n)) of electronic watermark data is predetermined electronic watermark data that does not affect the digital image data (401) even if the electronic watermark data is embedded in the digital image data (401).
Abstract:
A watermarking system comprises an encoding data processor operable to generate at least one marked version of an original item of material by introducing one of a predetermined set of code words into a copy of the original material item. The encoding data processor is arranged to form other code words of the set by cyclically shifting a first code word. The system includes a detecting data processor operable to identify the code word in the marked material item. The detecting data processor is operable to recover the code word from the marked material item and to form a Fourier transform of the recovered code word and a Fourier transform of the first code word of the set. The data detecting processor forms correlation samples by forming an inverse transform of a combination of the recovered and the first code word. Each of the correlation value samples provides the correlation value for one of the set of code words. A computationally efficient way of calculating the correlation for each code word in the set is thereby provided. As a result a time taken to detect a code word present in a marked material item is improved. The watermarking system finds particular application in identifying a point of distribution of pirate copies of video material generated by capturing the watermarked image, using, for example, a camcorder in a cinema.
Abstract:
A print management system includes a policy (113) that determines a protection level for a document to be printed. The document is printed using forgery detection and deterrence technologies, such as fragile and robust watermarks, glyphs, and digital signatures, that are appropriate to the level of protection determined by the policy. A plurality of printers (130) are managed by a print management system (112). Each printer (130) can provide a range of protection technologies. The policy determines the protection technologies for the document to be printed. The print management system (112) routes the print job to a printer (130) that can apply the appropriate protections and sets the appropriate parameters in the printer. Copy evidence that can establish that a document is a forgery and/or tracing information that identifies the custodian of the document and restrictions on copying of the document and use of the information in the document are included in the watermark that is printed on the document. A document can be verified as an original or established as a forgery by inspecting the copy evidence and/or tracing information in the watermark.
Abstract:
A watermarking system comprises an encoding data processor operable to generate at least one marked version of an original item of material by introducing one of a predetermined set of code words into a copy of the original material item. The apparatus comprises a code word generator operable to provide the code word having a plurality of code word coefficients, and an encoding processor operable to combine the code word coefficients with the material. Each of the plurality of code words of the set is uniquely associated with a data word having first and second fields. Each of a set of values of the first field is represented as a first part of the code word having a first plurality of coefficients, and the second field is represented as a second part of the code word having a second plurality of coefficients. The present invention provides a facility for generating watermark code words having a hierarchy of values. By providing watermark code words having first and second parts, a data word with first and second fields can be uniquely identified. The first and second fields can be assigned to different associated parameters such as for example address parameters. The first field could therefore identify the country of distribution of the material, whereas the second field could identify a particular distribution outlet within the country. A watermarking system can be formed, which finds particular application in identifying a point of distribution of pirate copies of video material generated by capturing the watermarked image, using, for example, a camcorder in a cinema.
Abstract:
Residue calculating sections (22-1, ···, 22-k') respectively obtain residues which take a plurality of integers as modulus, with respect to a user ID. The plurality of integers are stored in modulus storage sections (21-1, ···, 21-k') and are prime to each other. Based on these residues and parameters stored in a coding parameter storage section (23), component codes constructed by continuous sequences of 1 and 0 using a predetermined number of bits as a unit are respectively generated by component code generating sections (24-1, ···, 24-k'). These component codes are concatenated by a concatenating section (25), thereby to obtain a code to be embedded, which constructs watermark information.
Abstract:
Techniques for secure distribution of digital representations that combine encryption and watermarking. When a user at a client desires to download a digital representation, the user makes a request to a server for the digital representation, which encrypts the digital representation using a first key and downloads the encrypted digital representation to the user. Before the user performs any operation on the decrypted digital representation, a secret fingerprint watermark identifying the user is added to the digital representation. The fingerprint watermark is added either at the server or at the client and a copy of the fingerprinted digital representation is kept at the server. If the user makes an impermissible use of the digital representation, the secret fingerprint watermark can be used to identify the user. The request made by the user indicates the type of use that the user whished to make of the digital representation. If the use involves storage of the digital representation at the client, the server provides a second key that the client employs to encrypt the digital representation. If the user has permission to do so, the user may modify the digital representation and return the modified digital representation to the server for further distribution. In this case, the second key is used to encrypt the digital representation when it is sent to the server. The second key also serves as the user identification in the fingerprint watermark. If the user loses the second key, it can be recovered from the copy of the fingerprinted digital representation kept at the server. The first and second keys and any decrypted copy of the digital representation are kept in secure storage in the client.
Abstract:
The present invention is a method (Fig. 1) for hiding data in document contents. The method comprises receiving information relating to the document contents, (102) , wherein at least part of the document contents are of a binary nature, converting the data to halftone pixel groups according to predefined binary classifications associated with combinations of halftone pixels, (104), and embedding the halftone pixel groups into a binary portion of the document contents (104 and 114). Further, the present invention is a method for extracting data hidden in document contents (Fig. 7) The method comprises receiving information relating to the document contents (702), wherein the document contents include halftone pixel groups, extracting the halftone pixel groups from the document contents (712), and converting the halftone pixel groups to the data according to predefined binary classifications associated with combinations of halftone pixels (714).
Abstract:
A unit for embedding watermark information containing information of a user identification number into a predetermined content, comprising:
means for outputting one codeword selected from a plurality of codewords constructing a simplex code, in correspondence with an inputted user identification number, and means for embedding the outputted codeword as the watermark information into the content as an embedding target,
wherein the Hamming distance between codewords of component codes is proportional to the distance between watermarks corresponding to the codewords.
Abstract:
A unit for embedding watermark information containing information of a user identification number into a predetermined content, comprising:
means for outputting one codeword selected from a plurality of codewords constructing a simplex code, in correspondence with an inputted user identification number, and means for embedding the outputted codeword as the watermark information into the content as an embedding target,
wherein the Hamming distance between codewords of component codes is proportional to the distance between watermarks corresponding to the codewords.