Abstract:
Systems and methods for detecting hidden messages and information in digital files are described. In an embodiment, a method of detecting steganography in a compressed digital image includes extracting neighboring joint density features from the image under scrutiny. Steganography in the image may be detected based on differences in a neighboring joint density feature of the image.
Abstract:
Consumer uses of mobile devices and electronic media are changing. Mobile devices include increased computational capabilities, mobile broadband access, better integrated sensors, and higher resolution screens. These enhanced features are driving increased consumption of media such as images, maps, e-books, audio, video, and games. As users become more accustomed to using mobile devices for media, opportunities arise for new digital watermarking usage models. For example, transient media, like images being displayed on screens, can be watermarked to provide a link between mobile devices, extending the reach of digital watermarking. Digital fingerprinting can also be employed. Applications based on these emerging usage models can provide richer user experiences and drive increased media consumption. A great variety of other features and arrangements are also detailed.
Abstract:
The invention relates to a security element applied onto printing substrates (bank-notes, securities, product packagings, identity cards/labels or other similar documents) by printing, comprising a unique identifier as primary information visible to the naked eye and secondary information protecting against copying non-visible to the naked eye. The unique identifier is typically a point code. Said secondary information is represented by a structure with the largest dimension of 2 to 40 microns, and due to printing distortions arising when the security element is applied onto a printing substrate, said secondary information is non-reconstructable from the print of the security element and a statistically analyzable inherent feature is associated to it. The invention also relates to a printed matter with such an inventive security element and to a method to check authenticity of a printed matter with the inventive security element in visible light (380-750 nm).
Abstract:
A variety of methods and systems involving sensor-equipped portable devices, such as smartphones and tablet computers, are described. One particular embodiment decodes a digital watermark from imagery captured by the device and, by reference to watermark payload data, obtains salient point data corresponding to an object depicted in the imagery. Other embodiments obtain salient point data for an object through use of other technologies (e.g., NFC chips). The salient point data enables the device to interact with the object in a spatially-dependent manner. Many other features and arrangements are also detailed.
Abstract:
A system for providing feedback regarding detectability of a watermark message produced by a watermarking encoder includes a simulation module configured to combine at least one of a watermarked signal or an enhanced watermarked signal with a simulated environment signal that corresponds to an expected listening environment of the at least one of the watermarked signal or the enhanced watermarked signal, and output a simulated environment-modified watermarked signal corresponding to the combination of the at least one of the watermarked signal or the enhanced watermarked signal with the simulated environment signal, and a monitoring module configured to generate a watermark detectability indication based on the simulated environment-modified watermarked signal.
Abstract:
The invention relates to a method for assessing the presence of a watermark in a video wherein the video comprises at least a sequence of frames. The method comprises for at least one frame among one of the sequences of frames the steps of computing a set of axial cross-correlation values, wherein each axial cross-correlation value corresponds to a correlation between the frame and a reference watermark shifted along a spatial horizontal axis; obtaining a detection score by computing a weighted sum of values output by a function applied to said axial cross-correlation values; assessing the presence of a watermark according to the detection score. Such method is particularly well adapted to the detection of disparity coherent watermark but is compliant with any watermarking technique. A device implementing the method is further disclosed.
Abstract:
Methods, devices and computer program products facilitate the extraction of embedded watermarks in the presence of content distortions. Distortion of the content is estimated using two or more detected watermarks with an associated probability of false detection that is above a desired level. The estimated content distortion is used to obtain pre-distorted synchronization templates and to reevaluate the detected watermarks. The use of pre-distorted synchronization templates results in obtaining better estimations of content distortion, and improved reliability of watermark detections.
Abstract:
A method and system for identifying a source of a copied work that in one embodiment includes obtaining at least some portions of a reference work, collecting at least some portions of the suspect work, matching the suspect work with the reference work, wherein the matching includes temporally aligning one or more frames of the reference work and the suspect work, spatially aligning frames of the reference work and the suspect work, and detecting forensic marks in the suspect work by spatiotemporal matching with the reference work.
Abstract:
An invisible information embedding apparatus for embedding invisible information at a position in an obtained image includes an image analysis unit configured to obtain object information and positional information of an object included in the image, an embedding target image determining unit configured to determine whether the image is an embedding target based on the object information obtained by the image analysis unit, and an image synthesizing unit configured to combine the image with the invisible information based on the determination result of the embedding target image determining unit.
Abstract:
Multiple transform utilization and applications for secure digital watermarking. In one embodiment of the present invention, digital blocks in digital information to be protected are transformed into the frequency domain using a fast Fourier transform. A plurality of frequencies and associated amplitudes are identified for each of the transformed digital blocks and a subset of the identified amplitudes is selected for each of the digital blocks using a primary mask from a key. Message information is selected from a message using a transformation table generated with a convolution mask. The chosen message information is encoded into each of the transformed digital blocks by altering the selected amplitudes based on the selected message information.