Abstract:
PROBLEM TO BE SOLVED: To embed or extract digitized information into/from analog host signal or cover signal having minimal affection on the perception of source information, relating with an apparatus for encoding and decoding information in analog signal. SOLUTION: An apparatus and a method for embedding digital data into an analog host signal or cover signal are provided. The feature of distributed signal of the cover signal in a specific definition region (time, frequency or space) is calculated, and compared with the assembly of prescribed quantized value corresponding to an information symbol to be encoded. The amount of change required to change the signal feature into the determined target quantized value is calculated and the cover signal is changed accordingly over the prescribed interval so as to change the feature value. The information symbol is extracted by an opposite process. In an embodiment, the prescribed value is a short term autocorrelation value of the cover signal. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
Methods, apparatus, and systems for signal continuity assessment using embedded watermarks are provided. The embedded watermarks are recovered from the content and one or more attributes associated with the recovered watermarks are identified. A continuity of th content can then be assessed in accordance with the one or more attributes. The continuity assessment may be based on a variety of factors, including but not limited to a determined heartbeat of the recovered watermarks, a density, separation, location, or extent, of the recovered watermarks, as well as information associated with the watermarks, such as a stego key, channel bits, packet numbers, a fingerprint, or the like.
Abstract:
Systems and methods are provided for monitoring transmissions of media content (such as audio and audiovisual content) in order to obtain independent and objective data regarding the use of specific media content recordings or works within the transmissions. Processing and reporting of such data is provided in various ways to serve a variety of business needs. Methods for employing content identification technology to efficiently and automatically obtain reliable, accurate, and precise monitoring data are also disclosed. Various information products and services based on such monitoring systems are proposed.
Abstract:
Methods for adapting the operation of a system in response to the detection of embedded watermarks from a digital host content are provided. A digital host content is received and examined for the presence of watermarks. In response to the detection of embedded watermarks and in accordance with the value, type, density or spacing of the detected watermarks, one or more system reactions may take place. These reactions include conditionally allowing the system to resume its normal operation, prohibiting the system from resuming its normal operation, degrading the quality of the digital host content or changing the security status of the digital host content. In response to the extraction of weak watermarks that do not meet the desired system requirements, the extraction operation may be modified or extended to enable the detection of strong watermarks.
Abstract:
A system for using a watermark embedded in an audio signal to remotely control a device (290). Various devices such as toys, computers, and appliances, equipped with an appropriate detector (292), detect the hidden signals, which can trigger an action, or change a state of the device. The watermarks can be used with a "time gate" device, where detection of the watermark opens a time interval within which a user is allowed to perform an action, such as pressing a button, typing in an answer, turning a key in a lock, etc. To prevent fraudulent activation of a time gate, the time gate device can be configured to react only to watermarks coming from live broadcasts, and not from replays from tapes or other storage devices. In another feature, robustness of the watermark is improved, e.g., for acoustic propagation channels, by shifting the detection time of the watermark based on a measured bit error count of the watermark. Furthermore, the watermark may be inserted before the desired action along with corresponding offset information if the audio signal is not suitable at the time of the action.
Abstract:
Systems, methods, devices and computer program products are provided that improve stego key management of watermarking systems and reduce the impact of leaked secrets related to watermark embedding and extraction operations. In the event that a watermark extractor is compromised and its extraction stego key is revealed, new extraction stego key sets are generated and assigned to a particular group of devices with similar security features. The new extraction stego key sets have significant overlap with one another, and can be retired once a device within the particular group of devices is compromised. The described techniques are complementary to other security enhancement practices, such as obfuscation and tamper resistant techniques, to strengthen the security of a watermarking system.
Abstract:
Methods, devices, and computer program products facilitate the application of content usage rules based on watermarks that are embedded in a content. The required content screening operations, including watermark extraction and the application of content usage enforcement actions, are organized as separate tasks. These tasks can be conducted at different times by different devices. The watermark extraction results are stored in a secure location and can be accessed by other devices at different times. These operations can be conducted by one or more trusted devices that reside in a home network. The trustworthiness of the devices can be ascertained during a device authentication process. Further, certain device capabilities can be ascertained either as part of the device authentication process, or through additional communications between the devices.
Abstract:
Methods are provided for embedding auxiliary information in a host content signal which reduces the memory, bandwidth and computational complexity of the embedding and transmission systems, m one embodiment, a first reduced-scale signal is produced [figure 2, ref. Num "230"] which corresponds to the host content embedded with a first logical value [figure 2, ref. Num "220"] and producing a second reduced-scale signal [figure 2, ref. Num "235"] corresponding to the host content embedded with a second logical value [figure 2, ref. Num "225"]. A first set of segments from the first reduced-scale signal may be combined with a second set of segments from the second reduced-scale signal in a pre-defined manner to produce a composite embedded host content [figure 2, ref. Num "230"]. Thus the storage and transmission requirements of the watermarking system are reduced to having to deal with only the original content plus two reduced-scale signals.
Abstract:
Methods, devices, and computer program products facilitate the application of content usage rules based on watermarks that are embedded in a content. Watermark extraction and content screening operations, which can include the application of content usage enforcement actions, may be organized such that some or all of the operations can be conducted at different times by different devices. These operations can be conducted by one or more trusted devices that reside in a networked environment. The authenticity of various devices can be verified through the exchange of certificates that can further enable such devices to ascertain capabilities of one another. Based on the ascertained capabilities, an operational configuration for conducting watermark extraction and content screening can be determined.
Abstract:
Methods and apparatus for embedding digital watermarks into a digital host content are provided. A digital host content is received, e.g., at a receiver or other device incorporating a receiver. One or more watermark embedding technologies is selected. Multiple embedding opportunities are identified within the host content. A subset of the identified embedding opportunities is selected. A multiplicity of digital watermarks are then embedded into the host content in accordance with the selected subset of embedding opportunities utilizing the one or more selected watermark embedding technologies. The selecting of the subset of embedding opportunities may be adapted to provide a desired tradeoff between levels of robustness, security, and transparency of the watermark. A plurality of watermarking embedding technologies may be selected and used in the embedding step.