Abstract:
Described herein is a technology for facilitating watermarking of digital goods. The technology, described herein, performs watermark embedding and the detection of embedded watermarks based upon rational statistics of multiple regions of a digital good
Abstract:
A method and system of authentication for sensor-recorders and other information capture devices is disclosed. In accordance with aspects of the current invention, a digital sample of the environment is obtained. From this sample and at least one parameter representative of at least one condition under which the sample was generated, a digital signature is created. This signature is stored in memory with the sample to be checked at a later time for authenticity. The file is checked for authenticity by generating a second signature from the file and comparing that signature to the original signature. If the two signatures are identical, the sample is considered authentic and if the two signatures are different, the sample cannot be authenticated.
Abstract:
A method for context watermarking includes the steps of performing a Hash function “D” of the digital content (502). A Hash function “C” of the context information is also calculated (504). The Hash “D” is then appended to the context information (506) while the Hash “C” is appended to the digital content (508). The augmented content and context information are then packaged together (510) with the Hash values “D” and “C” helping to bind the content and context together. Instead of using Hash function other more sophisticated signatures can be used like those produced using Discrete Wavelet Transforms (DWT) or fractal-based transforms. An electronic device such as a radio communication device (700) capable of performing context watermarking is also described.
Abstract:
An implementation of a technology is described herein that facilitates rights enforcement of digital goods using watermarks. More particularly, it is a fingerprinting technology for protecting digital goods by detecting collusion as a malicious attack and identifying the participating colluders. If a digital pirate breaks one client and enables this client to avoid watermark detection, all content (both marked/protected an unmarked/free) can be played as unmarked only on that particular client. However, to enable other clients to play content as unmarked, the digital pirate needs to collude the extracted detection keys from many clients in order to create content that can evade watermark detection on all clients. The described implementation significantly improves collusion resistance through a fingerprinting mechanism that can identify the members of a malicious coalition even when their numbers are several orders of magnitude greater than what conventional collusion-protection schemes can accomplish. However, in this scenario each member of the malicious coalition leaves a fingerprint in every digital good from which the estimated watermark is subtracted. Thus, like a burglar without gloves, the digital pirate leaves her fingerprints only when she commits a crime. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
Abstract:
An implementation of a technology is described herein that facilitates rights enforcement of digital goods using watermarks. More particularly, it is a fingerprinting technology for protecting digital goods by detecting collusion as a malicious attack and identifying the participating colluders. If a digital pirate breaks one client and enables this client to avoid watermark detection, all content (both marked/protected an unmarked/free) can be played as unmarked only on that particular client. However, to enable other clients to play content as unmarked, the digital pirate needs to collude the extracted detection keys from many clients in order to create content that can evade watermark detection on all clients. The described implementation significantly improves collusion resistance through a fingerprinting mechanism that can identify the members of a malicious coalition even when their numbers are several orders of magnitude greater than what conventional collusion-protection schemes can accomplish. However, in this scenario each member of the malicious coalition leaves a fingerprint in every digital good from which the estimated watermark is subtracted. Thus, like a burglar without gloves, the digital pirate leaves her fingerprints only when she commits a crime. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
Abstract:
An implementation is described herein facilitates certification of goods and/or identifications of the source of such goods. At least one implementation, described herein, embeds a watermark into a relatively small amount of data in a deterministic manner. At least one implementation, described herein, generates an authentication transformation matrix based, at least in part, upon an authentication watermark and a pre-defined humanly perceptible authentication pattern (e.g., image, audio). With this implementation, it obtains subject goods that may have the authentication watermark embedded therein. It generates a humanly perceptible resultant pattern (e.g., image, audio) based, at least in part, upon the watermark detected in subject goods and the transformation matrix. If the detected watermark is the authentication watermark, then the resultant pattern and the pre-defined authentication pattern will match (or nearly so). At least one implementation, described herein, hides a secret key around the periphery of watermarked goods. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
Abstract:
A watermark embedder transforms a media signal from its perceptual domain to frequency domain regions and embeds a hash of data from one frequency domain region into a watermark in another frequency domain region. Alternatively, it encodes instances of the same message into the frequency domain regions. To detect alteration of the media signal, a watermark decoder transforms a suspect signal into the frequency domain regions, extracts the watermark message from a first frequency domain region and compares it with a reference derived from another frequency domain region. The reference signal is either a hash computed from the other frequency domain region of the watermarked signal, or another instance of the same message embedded into the other frequency domain region. The decoder can be used to detect alteration of the signal, such as alteration that occurs with reproduction (printing, scanning, copying, D/A-A/D conversion, etc.), compression, cropping or swapping of media signal content, etc.
Abstract:
An image pickup apparatus certifies unchanged image data by photographing a person using the image pickup apparatus. Two steps are carried out with the image pickup apparatus, coding image data and enciphering the coded image data, which includes changing the original data to encryption data. The enciphering also includes adding a watermark to the coded data. The coding of the image data and enciphering of the coded data are performed before the coded data is stored in a medium or is transferred to another device.
Abstract:
A method and system for creating authentication signatures for digital images and video frames is provided. The method and system involves partitioning the image into multiple blocks, comparing characteristics from each block and generating data bits based on the comparison. Each block is then broken up into additional blocks and those blocks are compared to create additional signature bits which are combined with the signature sets from the first set of blocks. Each of these new smaller blocks can be further broken up and the procedure can be repeated to provide an authentication signature of desired length.
Abstract:
An embodiment of the invention provides a method for performing electronic postmarking of data, including ancillary data is provided. The method includes receiving data from a sender. The method further includes selecting ancillary data. The method further includes generating an electronic postmark including the ancillary data. The method further includes forwarding the data with the electronic postmark including the ancillary data to a receiver.