Embedding watermark information in an electronic document

    公开(公告)号:GB2344666A

    公开(公告)日:2000-06-14

    申请号:GB9921762

    申请日:1999-09-16

    Applicant: IBM

    Abstract: Embedding information, particularly electronic watermark information, in document data that includes text and is written in a page/content description language. A sequence of locations where the information is to be embedded is generated, based on an analysis of the layout of the document data and using a string of sequential pseudo-random numbers (Figs. 1 and 7). The embedded information can comprise a change in pitch between two designated characters and their succeeding characters (Fig. 3). Alternative, more "robust" watermarks are also described. In one (Fig. 9), a page description that represents either a relative distance travelled from a reference point of a string of characters in which the information is to be embedded, or a relative distance travelled from a reference point of the previous character, is changed: an "equalization attack" destroys the watermark information but also damages the document appearance (Fig. 4). In another, a "compound font" can be used in the page description to replace one or more characters (Figs 5 and 10). Alternatively, the page description data is changed so that a graphic primitive is used to replace a selected character (Figs. 6 and 11).

    DATA ACCESS MANGAGING SYSTEM
    53.
    发明专利

    公开(公告)号:PL332798A1

    公开(公告)日:1999-10-11

    申请号:PL33279897

    申请日:1997-08-12

    Applicant: IBM

    Abstract: In providing a system that can manage access to data to effectively prevent illegal access to the data or the like, there is provided a system for embedding access management information that prepares management information for managing access to the data, and embeds the management information in the data through data transformation without changing amount of data. In managing access to data, there is provided a method that extracts management information embedded in the data through data deformation without changing amount of data, and manages access to the data according to the extracted management information. There is also provided a method for changing management of access to the data according to the type of medium in which the data is stored (RAM or ROM). The management information further contains information for controlling recording of the data, reception of the data, playback of the data, interference of output of the data, duplication history of the data, or modification of the management information. The access management method can prevent illegal duplication of data or the like, and can effectively protect a work.

    METHOD AND SYSTEM FOR MANAGING ACCESS TO DATA THROUGH DATA TRANSFORMATION

    公开(公告)号:CA2265647A1

    公开(公告)日:1998-04-23

    申请号:CA2265647

    申请日:1997-08-12

    Applicant: IBM

    Abstract: A system for managing access to data and effectively preventing illegal access to data is provided with an access management information burying system in which management information for managing access to the data is prepared and the management information is buried in the data by deforming the data without changing the quantity of data. A method for managing access to data in which, the management information buried in the data by deforming the data without changing the quantity of the data is extracted and access to the data is managed in accordance with the extracted information. A method for changing the management of access to data in accordance with the kind of the medium (RAM or ROM) where the data are stored. The management information including the information for controlling the recording, receiving, reproducing, output hindering, copying history of the data, or changing of the management information. By the access management method, the illegal copying, etc., of the data can be prevented and a literary work can be protected effectively.

    DATA HIDING AND EXTRACTION METHODS
    55.
    发明专利

    公开(公告)号:CA2230071A1

    公开(公告)日:1997-12-24

    申请号:CA2230071

    申请日:1997-02-13

    Applicant: IBM

    Abstract: A data hiding method for hiding message data in media data and a data extracting method for extracting message data hidden in the media data. In the data hiding method, the message data are dispersedly hidden in the media data so that no third person can alter the message data. Specifically, the array elements of a message array are dispersedly hidden in a media array based on a status value S designating a specific array element in the media array when the media data and message data are expressed as the media array and the message array, respectively. The hiding method includes (a) a step of determining the j-th (j0) status value Sj, (b) a step of determining the (j+1)th status value Sj+1 based on the value Sj, the array element of the media array designated by the value Sj and the above-mentioned array element of the message array, and (c) a step of hiding data to be hidden in the array element of the media array designated by the value Sj+1.

    METHOD FOR HIDING MESSAGE DATA INTO MEDIA DATA AND A METHOD FOR EXTRACTING THAT HIDDEN DATA

    公开(公告)号:MY123085A

    公开(公告)日:2006-05-31

    申请号:MYPI9705022

    申请日:1997-10-24

    Applicant: IBM

    Abstract: A METHOD FOR HIDING MESSAGE INFORMATION INTO MEDIA INFORMATION IN FREQUENCY SPACE. THE DATA HIDING METHOD HAS HIGH RESISTANCE TO REMOVAL OR CHANGE OF MESSAGE INFORMATION EMBEDDED INTO MEDIA INFORMATION AND EFFECTIVELY MAINTAIN HIDDEN MESSAGE INFORMATION EVEN WHEN SIGNAL PROCESSING IS PERFORMED BY EMPLOYING A FREQUENCY FILTER. MORE SPECIFICALLY, IN ORDER TO HIDE MESSAGE INFORMATION (M) INTO MEDIA INFORMATION (M), THE FREQUENCY TRANSFORM OF THE MESSAGE INFORMATION (M) AND THE MEDIA INFORMATION (M) ARE PERFORMED, AND FREQUENCY SPECTRA FL AND F2 ARE OBTAINED. NEXT, FROM THE FREQUENCY SPECTRUM F2 OF THE MESSAGE INFORMATION (M), A REGION CONTAINING FEATURE FREQUENCY COMPONENTS REPRESENTATIVE OF THE FEATURES OF THE MESSAGE INFORMATION (M) IN REAL SPACE IS EXTRACTED AS THE BASE REGION B. THEN, N COPIES OF THE BASE REGION B ARE GENERATED, AND IN FREQUENCY SPACE, THE N COPIES ARE DISPERSEDLY ARRANGED.

    57.
    发明专利
    未知

    公开(公告)号:DE69733989T2

    公开(公告)日:2006-05-24

    申请号:DE69733989

    申请日:1997-11-14

    Applicant: IBM

    Abstract: In order to hide message information (m) in media information (M), the frequency transform of the message information (m) and the media information (M) are performed, and frequency spectra f1 and f2 are obtained. Next, from the frequency spectrum f2 of the message information (m), a region containing feature frequency components representative of the features of the message information (m) in real space is extracted as the base region B. Then, n copies of the base region B are generated, and in frequency space, the n copies are dispersedly arranged. Also, by making the frequency components other than that equal to zero, a frequency spectrum f3 is generated as intermediate information. Finally, the frequency spectrum f3 and the frequency spectrum f1 are added, and by performing the inverse frequency transform of the result, the message information (m) can be hidden in the media information (M).

    58.
    发明专利
    未知

    公开(公告)号:DE69733992D1

    公开(公告)日:2005-09-22

    申请号:DE69733992

    申请日:1997-12-10

    Applicant: IBM

    Abstract: A data hiding method for embedding message data into media data comprising the steps of obtaining a secondary key by inputting a key having a predetermined value to a specified function; determining hiding positions in which the message data will be embedded according to the obtained secondary key, and selecting one of plural hiding functions according to the secondary key so that the selected hiding function is used for each of the determined hiding positions; and embedding the message data into each of the determined hiding positions according to the selected hiding function corresponding to the hiding position.

    METHOD AND SYSTEM FOR MANAGING ACCESS TO DATA THROUGH DATA TRANSFORMATION

    公开(公告)号:CA2265647C

    公开(公告)日:2003-09-23

    申请号:CA2265647

    申请日:1997-08-12

    Applicant: IBM

    Abstract: In providing a system that can manage access to data to effectively prevent illegal access to the data or the like, there is provided a system for embedding access management information that prepares management information for managing access to the data, and embeds the management information in the data through data transformation without changing amount of data. In managing access to data, there is provided a method that extracts management information embedded in the data through data deformation without changing amount of data, and manages access to the data according to the extracted management information. There is also provided a method for changing management of access to the data according to the type of medium in which the data is stored (RAM or ROM). The management information further contains information for controlling recording of the data, reception of the data, playback of the data, interference of output of the data, duplication history of the data, or modification of the management information. The access management method can prevent illegal duplication of data or the like, and can effectively protect a work.

    60.
    发明专利
    未知

    公开(公告)号:AT235089T

    公开(公告)日:2003-04-15

    申请号:AT97309192

    申请日:1997-11-14

    Applicant: IBM

    Abstract: A digital camera has means to authentication information into a photographed image for detecting the identity of the image. The authentication information supplied integrally with the image data, so that, the verifier can verify the image data without saving the authentication information. This is achieved by having a region dividing unit 24 for dividing the image into a first image region and a second image region in response to the digital signal, authentication information generating means 29 for generating authentication information from data in the first image region, encrypting means 30 for encrypting the authentication information, hiding means 25 for embedding the encrypted authentication information into the second image region by operating the data in the second image region, and region combining means 26 for combining the first image region in the image with the second image region in which the authentication information is embedded.

Patent Agency Ranking