Abstract:
Methods, devices, and computer-program products are provided for adding and decoding data to a digital video signal in a visually imperceptible manner. For example, an encoded video frame can be obtained, and one or more blocks of the encoded video frame can be decoded. Binary data can be added to a subset of pixels from a set of pixels of the one or more blocks. For instance, a pixel component can be modulated to add the binary data. The one or more blocks can be re-encoded using at least one coding mode. The re-encoded one or more blocks can be added to the encoded video frame.
Abstract:
A computer system for the creation of subliminal image or watermarks where the apparent video is an “obvious” image and a subliminal or “clandestine” image or watermark is hidden within the data structure. The concept is envisioned for the cloaking of images, sound, video or like digitized non-coded information. The cloaked files may be intended for storage, transmission, or clandestine placement in a public file system. The watermark may be used for the subliminal marking of a source of a file, its creation, or for tagging copyrighted information.
Abstract:
Multi-blend fingerprinting may be detected. First, a video sample may be received. Next, frames of the received video sample may be step iteratively through until a probability value corresponding to a current frame indicates a match. Deciding that the probability value indicates the match may comprise creating an augmented frame, determining the probability value corresponding to the created augmented frame, and determining that the probability value indicates the match. Then a fingerprint from the created augmented frame may be extracted.
Abstract:
A zero-watermarking registration and detection method for HEVC video streaming against requantization transcoding is provided. To increase an attack-resistance of a registration watermarking, the registration method firstly processes depth values corresponding to respective brightness blocks in a target video streaming with a depth binarization during constructing registration watermarking information through depth features, because the depth binarization well reflects a robustness of the registration watermarking. A first watermarking information matrix including a part of the depth values after the depth binarization is encrypted with a random matrix, so as to increase a safety of the registration watermarking. The registration method directly generates zero-watermarking through the depth features of the video streaming without modifying original carrier information and affecting a watermarking transparency. Meanwhile, the registration method has a strong robustness against attacks, such as the requantization transcoding of quantization parameters within a certain range of variation and common signal processing.
Abstract:
An image code is for information storage, transfer and identification, a method of generating and analyzing the same, and an apparatus for implementing the method, the image code includes a standard image area, at least one image filled in the standard image region, at least one segment of information stream implanted in the at least one image by using digital watermarking technique and 4 location identification graphics arranged in different positions of the standard image region, the location identification graphics are arranged in the 4 vertex angles of the standard image region, including 1 feature location identification graphic and 3 basic location identification graphics; the 3 basic location identification graphics are identical and the feature location identification graphic is different from the basic location identification graphic.
Abstract:
Methods, devices, systems and computer program products facilitate embedding and extraction of transactional watermarks into and from a video content. One such method includes selecting a first number of frames from a video content and performing temporal and a spatial psychovisual analysis on the selected frames. For each selected frame, at least one area for insertion of watermarks is identified. A first and a second watermark symbol is embedded separately in the identified area(s), and the embedded frames are re-encoded to obtain a first and a second alternative data. An inserter manifest is formed that includes the first and the second alternative data to enable insertion of a watermark into the video content by selecting one or the other of the first and second alternative data for insertion into the video content.
Abstract:
A system (50) is used for identifying a content item. The system (50) receives a received first identifier (101) of the content item, the received first identifier being based on at least part of a baseband level representation of the content item; a received second identifier (102) of the content item, the received second identifier being based on at least part of an encoded representation (103) of the content item; and the at least part of the encoded representation (103) of the content item. The system comprises a second identifier generator (53) for generating a generated second identifier based on the at least part of the encoded representation (103) of the content item; and a validation unit (54) for validating the received first identifier as a valid first identifier of the content item if the generated second identifier matches the received second identifier.
Abstract:
Multiple transform utilization and applications for secure digital watermarking. In one embodiment of the present invention, digital blocks in digital information to be protected are transformed into the frequency domain using a fast Fourier transform. A plurality of frequencies and associated amplitudes are identified for each of the transformed digital blocks and a subset of the identified amplitudes is selected for each of the digital blocks using a primary mask from a key. Message information is selected from a message using a transformation table generated with a convolution mask. The chosen message information is encoded into each of the transformed digital blocks by altering the selected amplitudes based on the selected message information.
Abstract:
A correlation-based system for watermarking continuous digital media at the system application level. It is a post-compression process for watermarking where no a priori knowledge of the underlying compression algorithm is required. Per each compressed media frame, a current unique digital signature is generated based on the data from the current compressed frame plus the digital signature that has been previously generated. The signature thus generated is then used in conjunction with the next compressed frame to generate the next unique digital signature. All digital signatures are correlated according to the above process until a “reset” signal is issued. A new chain of correlated digital signatures is produced by the system with a pre-determined initial signature.
Abstract:
Various implementations are provided for, for example, determining watermarking data, performing the watermarking, and processing watermarked data. At least one implementation watermarks AVC bitstream that uses CAVLC entropy coding. The watermarking data may be determined in a pre-processing stage and stored for later use in watermark a bitstream. One method accesses variable-length encoded data including an encoding of information identifying an actual reference used to predictively encode an image. The encoding of the information has a particular value. The method determines an alternative value that is different from the particular value, such that the alternative value is an encoding of alternative information that identifies a different reference from the actual reference. The alternative value is for use in watermarking the variable-length encoded data.