Abstract:
A system and method for generating forensically marking image data from source material. A generated forensic mark will vary from copy (810) to copy (815) by using a selected forensic marking technique (810, 815) and forensic marking parameters that change from copy to copy of the source image data.
Abstract:
Information available at a decoder is embedded into image content after decoding by first representing that information by at least one film grain pattern and then blending that at least one film grain pattern with the decoded image content. Such image content is typically in the form of a movie and examples of the information to be embedded include identification of the specific decoding device, the user of the decoding device, the time and date of decoding, the model number of the device, the versions of software running on the device, the status of the device or connections to the device, the contents of device registers or memory locations within the device, among many other possible data. When an unauthorized copy of image content is discovered, the copied image content undergoes a comparison to the decoded image content to generate difference data. Thereafter, the difference data undergoes comparison with a database of film grain patterns to recover the embedded data.
Abstract:
Information available at a decoder is embedded into image content after decoding by first representing that information by at least one film grain pattern and then blending that at least one film grain pattern with the decoded image content. Such image content is typically in the form of a movie and examples of the information to be embedded include identification of the specific decoding device, the user of the decoding device, the time and date of decoding, the model number of the device, the versions of software running on the device, the status of the device or connections to the device, the contents of device registers or memory locations within the device, among many other possible data. When an unauthorized copy of image content is discovered, the copied image content undergoes a comparison to the decoded image content to generate difference data. Thereafter, the difference data undergoes comparison with a database of film grain patterns to recover the embedded data.
Abstract:
This invention uses a storage device more effectively than ever before to store image data in a predetermined storage device for future security chasing. A determination unit (203) determines whether related image data which can be considered substantially identical to image data acquired by an acquisition unit (210) is stored in a predetermined storage device (202) for future chasing. If related image data is stored, link information to the related image data is written instead of writing the acquired image data to the storage device (202). On the other hand, no related image data is stored, the acquired image data is written to the storage device (202).
Abstract:
A visible first watermark and invisible second and third watermarks are embedded in media content (110), in order to protect the media content (110) from piracy. The visible first watermark protects the media content (110) during distribution and storage, while the invisible second and third watermarks are embedded in to identify a content owner (102) and displaying entity (108); respectively. The second and third watermark keys (202, 204) can be used to detect the associated watermarks for forensic purposes. The first, second and third watermarks keys (200, 202, 204) are symmetric keys. A distribution entity (106) embeds the visible first watermark in the media content (110) using the first watermark key (200) and embeds and invisible second watermark in the media content (110) using the second watermark key (202). The distribution entity (106) transmits the media content (110) with the embedded visible first watermark and invisible second watermark to a displaying entity (108), wherein the displaying entity (108) removes the visible first watermark from the media content (110) using the first watermark key (200) and embeds the invisible third watermark in the media content (110) using the third watermark key (204):
Abstract:
A watermark system includes an embedder (106), detector (110), and reader (116). The watermark embedder (106) encodes a watermark signal (108) in a potentially corrupted version of the combined signal, and computes its orientation. Finally, a reader extracts a message in the watermark signal from the combined signal using the orientation to approximate the original state of the combined signal. While adapted for images, video and audio, the watermark system, applies to other electronic and physical media. For example, it can be applied to mark graphical models, blank paper, film and other substrates, texturing objects for ID purposes, etc.
Abstract:
A forensic authentication system includes an imaging device to capture an image of a printed mark and a non-printed area of a substrate directly adjacent to the printed mark, and a processor to run computer readable instructions. The processor can run computer readable instructions to utilize a model to define a substrate region that corresponds with at least a portion of the non-printed area of the substrate directly adjacent to the printed mark; and computer readable instructions to generate a substrate signature for the defined substrate region. Each of the computer readable instructions is embedded on a non-transitory, tangible computer readable medium.