Abstract:
An intra-block of the I-frame or P,B-frame is detected from an MPEG stream. When it is detected, one macro block of data is taken out from the MPEG stream and buffered. The buffered macro block is embedded with a pattern so that the length of the VLC may be invariant. The macro block embedded with a pattern is returned back to the MPEG stream. More specifically, the DC component is detected from the buffered macro block and a pseudo-random number is generated in order to generate a pattern to be embedded. It is judged whether or not the bit length of the DC component is invariant when the generated pattern is embedded. If the bit length is invariant, the pattern is embedded in the buffered macro block. When the bit length is varied, it is judged whether or not half of the pattern can be embedded. If possible, the pattern is embedded.
Abstract:
A data hiding method for hiding message data in media data and a data extracting method for extracting message data hidden in the media data. In the data hiding method, the message data are dispersedly hidden in the media data so that no third person can alter the message data. Specifically, the array elements of a message array are dispersedly hidden in a media array based on a status value S designating a specific array element in the media array when the media data and message data are expressed as the media array and the message array, respectively. The hiding method includes (a) a step of determining the j-th (j>/=0) status value Sj, (b) a step of determining the (j+1)-th status value Sj+1 based on the value Sj, the array element of the media array designated by the value Sj and the above-mentioned array element of the message array, and (c) a step of hiding data to be hidden in the array element of the media array designated by the value Sj+1.
Abstract:
A data hiding method for hiding message data in media data and a data extracting method for extracting message data hidden in the media data. In the data hiding method, the message data are dispersedly hidden in the media data so that no third person can alter the message data. Specifically, the array elements of a message array are dispersedly hidden in a media array based on a status value S designating a specific array element in the media array when the media data and message data are expressed as the media array and the message array, respectively. The hiding method includes (a) a step of determining the j-th (j≥0) status value Sj, (b) a step of determining the (j+1)-th status value Sj+1 based on the value Sj, the array element of the media array designated by the value Sj and the above-mentioned array element of the message array, and (c) a step of hiding data to be hidden in the array element of the media array designated by the value Sj+1.
Abstract:
A method of hiding message information in media information in a frequency space. A high resistance to removal and alteration of hidden message is given. Even when signal processing is executed by using a frequency filter, the hidden message information is continuously maintained effectively. The frequency spectra (f1 and f2) of the medium information (M) and message information (m) are found by frequency-converting the information (m) and the information (M) in order to hide the message information (m) in media information (M). Then an area containing a characteristic frequency component indicating the feature of the message information (m) in a real space is extracted from the frequency spectrum (f2) of the message information (m) as a basic area (B). Then a frequency spectrum (f3) is generated as intermediate information by making n copies of the basic area (B), dispersedly arranging the copies in the frequency space and making the other frequency components zero. Lastly, the message information (m) is hidden in the medium information (M) by executing operation based on the frequency spectrum (f3) and medium information (M).
Abstract:
An intra-block of the I-frame or P,B-frame is detected from an MPEG stream. When it is detected, one macro block of data is taken out from the MPEG stream and buffered. The buffered macro block is embedded with a pattern so that the length of the VLC may be invariant. The macro block embedded with a pattern is returned back to the MPEG stream. More specifically, the DC component is detected from the buffered macro block and a pseudo-random number is generated in order to generate a pattern to be embedded. It is judged whether or not the bit length of the DC component is invariant when the generated pattern is embedded. If the bit length is invariant, the pattern is embedded in the buffered macro block. When the bit length is varied, it is judged whether or not half of the pattern can be embedded. If possible, the pattern is embedded.
Abstract:
PROBLEM TO BE SOLVED: To discriminate whether alteration is added to any part of a picture by embedding an electronic watermark to the picture. SOLUTION: Relating to an embedding part 30, DCT blocks of the luminance components Y of a picture are paired two by two, mutually corresponding DCT coefficients are randomly selected from respective DCT blocks included in each pair through the use of a random number, and data are embedded by operating so that a mutual relation between these DCT coefficients may express data in accordance with a prescribed rule. When this picture is altered, the DCT coefficients included in the pair of the altered part is no longer subjected to the rule but express a value different from original data. A sampling part 40 samples data from the picture, estimates data embedded first by majority, discriminates that a pair from which data different from the estimated data is altered, and displays it.
Abstract:
PROBLEM TO BE SOLVED: To properly detect a digital watermark by improving ruggedness of the digital watermark embedded in processed variously voice contents. SOLUTION: This device is provided with watermark signal detection parts 11 for calculating detected values of a watermark signal by using two or more keys to a PCM data of voice contents for each channel, an adding part 12 of two or more detected values for adding detected values corresponding to each channel and each key at each possible combination of each channel and each key, and a comparison selection part for selecting and outputting one addition result from among each addition result by the adding part 12 of two or more detected values. Moreover, this device is provided with a message reconstruction part 13 which accumulates these detected values at different accumulation cycles and reconstructs a message embedded as a digital watermark from the accumulated detected values and also performs boundary detection of the voice contents, to detect the voice contents in which the digital watermark is embedded, and a detection result output part 14 which synthesizes each result processed by the message reconstruction part 13 and outputs the result. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To aggressively and commercially use properties of an explosively propagating medium as advertisement business. SOLUTION: An advertisement distribution system is provided with a contents provision side system 30 which adds a contents ID as an identifier to each contents to provide contents for a user terminal 50, the user terminal 50 which acquires contents from the contents provision side system 30 through a network and recognizes the contents ID added to the acquired contents to send in onto the network, a sponsor side system 70 which distributes a prescribed advertisement to the user terminal 50 through the network on the basis of the contents ID to be sent, and a proxy server side system 10 which manages the contents ID added to contents and sends a trigger of advertisement distribution to the sponsor system side 70 which distributes and advertisement on the basis of the contents ID.
Abstract:
PROBLEM TO BE SOLVED: To pad information into document data including a text recorded by means of page description by generating a feature string deciding a position where information is padded based on a layout and changing the page description of the text in the decided position in accordance with the information to be padded. SOLUTION: A character string object in page description, which is a padding object, is divided so that the positions of characters all feature strings aji and bji can be operated. A part where is not used for padding is divided at random so that a person making an attack cannot easily detect a part where a watermark is padded. A layout is analyzed on the set of the divided character string objects and they are reconstituted into row data. The characters corresponding to the feature strings aji and bji against a document being the padding object are decided based on row data after reconstitution. At the time of padding, the feature string corresponding to (j) is selected. When j-th bit is '1', an operation for increasing aji-bji increases is executed when (i) is '1' to 'n'.