-
公开(公告)号:GB2330031B
公开(公告)日:2002-04-24
申请号:GB9819727
申请日:1998-09-11
Applicant: IBM
Inventor: MIWA KUNIHIKO , MORIMOTO NORISHIGE , SHIMIZU SHUICHI
-
公开(公告)号:GB2344666A
公开(公告)日:2000-06-14
申请号:GB9921762
申请日:1999-09-16
Applicant: IBM
Inventor: HIRAYAMA YUKI , AMANO TOMIO , SHIMIZU SCHUICHI , MORIMOTO NORISHIGE
Abstract: Embedding information, particularly electronic watermark information, in document data that includes text and is written in a page/content description language. A sequence of locations where the information is to be embedded is generated, based on an analysis of the layout of the document data and using a string of sequential pseudo-random numbers (Figs. 1 and 7). The embedded information can comprise a change in pitch between two designated characters and their succeeding characters (Fig. 3). Alternative, more "robust" watermarks are also described. In one (Fig. 9), a page description that represents either a relative distance travelled from a reference point of a string of characters in which the information is to be embedded, or a relative distance travelled from a reference point of the previous character, is changed: an "equalization attack" destroys the watermark information but also damages the document appearance (Fig. 4). In another, a "compound font" can be used in the page description to replace one or more characters (Figs 5 and 10). Alternatively, the page description data is changed so that a graphic primitive is used to replace a selected character (Figs. 6 and 11).
-
公开(公告)号:PL332798A1
公开(公告)日:1999-10-11
申请号:PL33279897
申请日:1997-08-12
Applicant: IBM
Inventor: MIWA KUNIHIKO , KOBAYASHI HIROYA , MORIMOTO NORISHIGE
Abstract: In providing a system that can manage access to data to effectively prevent illegal access to the data or the like, there is provided a system for embedding access management information that prepares management information for managing access to the data, and embeds the management information in the data through data transformation without changing amount of data. In managing access to data, there is provided a method that extracts management information embedded in the data through data deformation without changing amount of data, and manages access to the data according to the extracted management information. There is also provided a method for changing management of access to the data according to the type of medium in which the data is stored (RAM or ROM). The management information further contains information for controlling recording of the data, reception of the data, playback of the data, interference of output of the data, duplication history of the data, or modification of the management information. The access management method can prevent illegal duplication of data or the like, and can effectively protect a work.
-
公开(公告)号:CA2265647A1
公开(公告)日:1998-04-23
申请号:CA2265647
申请日:1997-08-12
Applicant: IBM
Inventor: MORIMOTO NORISHIGE , MIWA KUNIHIKO , KOBAYASHI HIROYA
Abstract: A system for managing access to data and effectively preventing illegal access to data is provided with an access management information burying system in which management information for managing access to the data is prepared and the management information is buried in the data by deforming the data without changing the quantity of data. A method for managing access to data in which, the management information buried in the data by deforming the data without changing the quantity of the data is extracted and access to the data is managed in accordance with the extracted information. A method for changing the management of access to data in accordance with the kind of the medium (RAM or ROM) where the data are stored. The management information including the information for controlling the recording, receiving, reproducing, output hindering, copying history of the data, or changing of the management information. By the access management method, the illegal copying, etc., of the data can be prevented and a literary work can be protected effectively.
-
公开(公告)号:CA2230071A1
公开(公告)日:1997-12-24
申请号:CA2230071
申请日:1997-02-13
Applicant: IBM
Inventor: KOBAYASHI MEI , SHIMIZU SHUICHI , MORIMOTO NORISHIGE , NUMAO MASAYUKI
Abstract: A data hiding method for hiding message data in media data and a data extracting method for extracting message data hidden in the media data. In the data hiding method, the message data are dispersedly hidden in the media data so that no third person can alter the message data. Specifically, the array elements of a message array are dispersedly hidden in a media array based on a status value S designating a specific array element in the media array when the media data and message data are expressed as the media array and the message array, respectively. The hiding method includes (a) a step of determining the j-th (j0) status value Sj, (b) a step of determining the (j+1)th status value Sj+1 based on the value Sj, the array element of the media array designated by the value Sj and the above-mentioned array element of the message array, and (c) a step of hiding data to be hidden in the array element of the media array designated by the value Sj+1.
-
56.
公开(公告)号:MY123085A
公开(公告)日:2006-05-31
申请号:MYPI9705022
申请日:1997-10-24
Applicant: IBM
Inventor: MORIMOTO NORISHIGE , TEZUKA SHU , NINOMIYA SYOITI
IPC: G06F12/14 , H04L9/32 , G06F21/24 , G06K9/36 , G06T1/00 , G09C5/00 , H04N1/32 , H04N1/387 , H04N7/08 , H04N7/081
Abstract: A METHOD FOR HIDING MESSAGE INFORMATION INTO MEDIA INFORMATION IN FREQUENCY SPACE. THE DATA HIDING METHOD HAS HIGH RESISTANCE TO REMOVAL OR CHANGE OF MESSAGE INFORMATION EMBEDDED INTO MEDIA INFORMATION AND EFFECTIVELY MAINTAIN HIDDEN MESSAGE INFORMATION EVEN WHEN SIGNAL PROCESSING IS PERFORMED BY EMPLOYING A FREQUENCY FILTER. MORE SPECIFICALLY, IN ORDER TO HIDE MESSAGE INFORMATION (M) INTO MEDIA INFORMATION (M), THE FREQUENCY TRANSFORM OF THE MESSAGE INFORMATION (M) AND THE MEDIA INFORMATION (M) ARE PERFORMED, AND FREQUENCY SPECTRA FL AND F2 ARE OBTAINED. NEXT, FROM THE FREQUENCY SPECTRUM F2 OF THE MESSAGE INFORMATION (M), A REGION CONTAINING FEATURE FREQUENCY COMPONENTS REPRESENTATIVE OF THE FEATURES OF THE MESSAGE INFORMATION (M) IN REAL SPACE IS EXTRACTED AS THE BASE REGION B. THEN, N COPIES OF THE BASE REGION B ARE GENERATED, AND IN FREQUENCY SPACE, THE N COPIES ARE DISPERSEDLY ARRANGED.
-
公开(公告)号:DE69733989T2
公开(公告)日:2006-05-24
申请号:DE69733989
申请日:1997-11-14
Applicant: IBM
Inventor: NINOMIYA SYOITI , TEZUKA SHU , MORIMOTO NORISHIGE
IPC: G06F12/14 , G06T11/00 , G06F21/24 , G06T1/00 , G09C5/00 , H04N1/32 , H04N1/387 , H04N7/08 , H04N7/081
Abstract: In order to hide message information (m) in media information (M), the frequency transform of the message information (m) and the media information (M) are performed, and frequency spectra f1 and f2 are obtained. Next, from the frequency spectrum f2 of the message information (m), a region containing feature frequency components representative of the features of the message information (m) in real space is extracted as the base region B. Then, n copies of the base region B are generated, and in frequency space, the n copies are dispersedly arranged. Also, by making the frequency components other than that equal to zero, a frequency spectrum f3 is generated as intermediate information. Finally, the frequency spectrum f3 and the frequency spectrum f1 are added, and by performing the inverse frequency transform of the result, the message information (m) can be hidden in the media information (M).
-
公开(公告)号:DE69733992D1
公开(公告)日:2005-09-22
申请号:DE69733992
申请日:1997-12-10
Applicant: IBM
Inventor: SHIMIZU SHUICHI , KOIDE AKIO , MORIMOTO NORISHIGE , KOBAYASHI SEIJI
Abstract: A data hiding method for embedding message data into media data comprising the steps of obtaining a secondary key by inputting a key having a predetermined value to a specified function; determining hiding positions in which the message data will be embedded according to the obtained secondary key, and selecting one of plural hiding functions according to the secondary key so that the selected hiding function is used for each of the determined hiding positions; and embedding the message data into each of the determined hiding positions according to the selected hiding function corresponding to the hiding position.
-
公开(公告)号:CA2265647C
公开(公告)日:2003-09-23
申请号:CA2265647
申请日:1997-08-12
Applicant: IBM
Inventor: MIWA KUNIHIKO , KOBAYASHI HIROYA , MORIMOTO NORISHIGE
Abstract: In providing a system that can manage access to data to effectively prevent illegal access to the data or the like, there is provided a system for embedding access management information that prepares management information for managing access to the data, and embeds the management information in the data through data transformation without changing amount of data. In managing access to data, there is provided a method that extracts management information embedded in the data through data deformation without changing amount of data, and manages access to the data according to the extracted management information. There is also provided a method for changing management of access to the data according to the type of medium in which the data is stored (RAM or ROM). The management information further contains information for controlling recording of the data, reception of the data, playback of the data, interference of output of the data, duplication history of the data, or modification of the management information. The access management method can prevent illegal duplication of data or the like, and can effectively protect a work.
-
公开(公告)号:AT235089T
公开(公告)日:2003-04-15
申请号:AT97309192
申请日:1997-11-14
Applicant: IBM
Inventor: SHIMIZU SHUICHI , NUMAO MASAYUKI , MORIMOTO NORISHIGE
IPC: H04N5/225 , G06T1/00 , H04N1/32 , H04N1/387 , H04N7/167 , H04N7/18 , H04N21/4405 , H04N21/4623 , H04N21/83 , G06T11/00
Abstract: A digital camera has means to authentication information into a photographed image for detecting the identity of the image. The authentication information supplied integrally with the image data, so that, the verifier can verify the image data without saving the authentication information. This is achieved by having a region dividing unit 24 for dividing the image into a first image region and a second image region in response to the digital signal, authentication information generating means 29 for generating authentication information from data in the first image region, encrypting means 30 for encrypting the authentication information, hiding means 25 for embedding the encrypted authentication information into the second image region by operating the data in the second image region, and region combining means 26 for combining the first image region in the image with the second image region in which the authentication information is embedded.
-
-
-
-
-
-
-
-
-