-
公开(公告)号:JP2000153842A
公开(公告)日:2000-06-06
申请号:JP26971999
申请日:1999-09-24
Applicant: IBM
Inventor: AFZALI-ARDAKANI ALI , FEGER CLAUDIUS , MARTENS MARCO , MOSKOWITZ PAUL A , SCHROTT ALEJANDRO GABRIEL , TRESSER CHARLES P , GUTFELD ROBERT JACOB VON
Abstract: PROBLEM TO BE SOLVED: To prevent illegal resale by forming at least one of coat and code on an item and determining whether the item has been resold from an authorized merchant to an unauthorized merchant by checking the coat or code. SOLUTION: This identifier is extremely difficult if not impossible to remove. The identifier has its allocation and encoded code known only to a manufacturer. When the manufacturer suspects that parallel commercial transaction is occurring, he easily identifies an unauthorized reseller and can take appropriate countermeasures to prevent unauthorized activity. The system 50 includes a processor 51, a special coat/ruled code to be attached onto an item of interest and a detector 53 for determining information contents of the special coat/ scribing code. Although the detector 53 is shown separately from the processor 51, the detector can incorporate the processor therein.
-
公开(公告)号:GB2343279A
公开(公告)日:2000-05-03
申请号:GB9924448
申请日:1999-10-18
Applicant: IBM
Inventor: AFZALI-ARDAKANI ALI , FEGER CLAUDIUS , MARTENS MARCO , MOSKOWITZ PAUL ANDREW , SCHROTT ALEJANDRO GABRIEL , TRESSER CHARLES PHILIPPE LOUIS , GUTFELD ROBERT JACOB VON
Abstract: A system and method for detecting parallel (grey, diversion) marketing of an item, include forming at least one of a coating 1 and a code 34 on the item, interrogating the at least one of the coating and code, and determining from the interrogating whether the item has been transferred from an authorized merchant to an unauthorized merchant.
-
公开(公告)号:GB2362240B
公开(公告)日:2004-04-28
申请号:GB0022615
申请日:2000-09-15
Applicant: IBM
Inventor: AGGARWAL GAURAV , DUBEY PRADEEP , KULSHRESHTHA ASHUTOSH , MARTENS MARCO , TRESSER CHARLES PHILIPPE LOUIS , WU CHAI WAH
Abstract: A method is presented for marking high-quality digital images with a robust and invisible watermark. It requires the mark to survive and remain detectable and authenticatable through all image manipulations that in themselves do not damage the image beyond useability. These manipulations include JPEG "lossy" compression and, in the extreme, the printing and rescanning of the image. The watermark also has the property that it can detect if the essential contents of the image has changed. The first phase of the method comprises extracting a digest or number N from the image so that N only (or mostly) depends on the essential information content, such that the same number N can be obtained from a scan of a high quality print of the image, from the compressed form of the image, or in general, from the image after minor modifications (introduced inadvertently by processing, noise etc.). The second phase comprises the marking. This can be done in form of an invisible robust watermark, or in form of some visible signature or watermark.
-
公开(公告)号:GB2358100B
公开(公告)日:2004-03-17
申请号:GB0029063
申请日:2000-11-29
Applicant: IBM
Inventor: BRAUDAWAY GORDON WESLEY , MARTENS MARCO , SHEARER JAMES B , TRESSER CHARLES PHILIPPE LOUIS , WU CAHI W
Abstract: A digital watermarking method encodes different pairs of watermarks into each of a plurality of images offered for use by a vendor. The watermarks in each pair are derived from two separate collections of watermarks and sufficiently different so as to prevent false positives. Because each pair of watermarks is assigned to a different customer relative to a particular image, unauthorized use of a digital image sold to a customer may be determined by locating the associated pair of watermarks assigned to the customer in the image. Collusion detection is also realized by forming each pair of masks from sub-collections of masks which are detectable in an image formed by combining the same images sold to one or more customers.
-
公开(公告)号:GB2362240A
公开(公告)日:2001-11-14
申请号:GB0022615
申请日:2000-09-15
Applicant: IBM
Inventor: AGGARWAL GAURAV , DUBEY PRADEEP , KULSHRESHTHA ASHUTOSH , MARTENS MARCO , TRESSER CHARLES PHILIPPE LOUIS , WU CHAI WAH
Abstract: A watermarking method for an image wherein a number N is embedded into an image as a invisible or visible robust watermark. The number N is generated from the essential components of the image such that the number N will be the same when generated from analysis of the image after processing (such as compression or printing) or noise introduces minor discrepancies or modifications which do not effect the images authenticity. The number N can be generated by performing a principal component analysis on a sample set of images with minor discrepancies or by using Wold's decomposition. Alternatively the image can be divided into n x n blocks and then transform coefficients are generated for each block, these are then quantized, the result is encrypted using a private key and this is then hashed using an algorithm to generate the number N. The authenticity of an image can be verified by generating the number N again when verifying and then comparing this to the number N embedded in the image, if the two do not match then it is considered that the image has been altered deliberately.
-
公开(公告)号:GB2358100A
公开(公告)日:2001-07-11
申请号:GB0029063
申请日:2000-11-29
Applicant: IBM
Inventor: BRAUDAWAY GORDON WESLEY , MARTENS MARCO , SHEARER JAMES B , TRESSER CHARLES PHILIPPE LOUIS , WU CAHI W
Abstract: The present invention relates to a digital watermarking method and system which encode different pairs of watermarks into each of a plurality of images offered for use by a vendor. The watermarks in each pair are derived from two separate collections (COL1 and COL2) of watermarks and sufficiently different so as to prevent false positives. Because each pair of watermarks is assigned to a different customer relative to a particular image, unauthorised use of a digital image sold to a customer may be determined by locating the associated pair of watermarks assigned to the customer in the image. Collusion detection is also realized by forming each pair of masks from sub-collections of masks which are detectable in an image formed by combining the same images sold to one or more customers.
-
-
-
-
-