Multibit forensic watermark with encrypted detection key

A multi-bit, watermarking technology, applied in watermark detectors and computer-readable codes, extracting multi-bit watermarks, detecting keys, and watermark embedders, can solve problems such as leakage and detection of key theft, and achieve less investment. , high-throughput, performance-enhancing effects

Inactive Publication Date: 2008-11-26
KONINKLIJKE PHILIPS ELECTRONICS NV
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when distributing watermark detectors to potentially unscrupulous clients, there is a risk that the detection key may be stolen or leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multibit forensic watermark with encrypted detection key
  • Multibit forensic watermark with encrypted detection key
  • Multibit forensic watermark with encrypted detection key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] figure 1 A strategy 10 for embedding auxiliary data (shown here as a multi-bit payload) into the main signal x according to an embodiment of the invention is schematically shown. The input to the embedding process consists of the identification number i, the reference watermark w R and the main signal x. In one embodiment, the embedding of the auxiliary data may be performed at one or more computer systems, as a watermark embedder or encoder, for example at a computer system located at the content owner. The output of the embedding process includes the encryption key h i and the watermarked signal y. The encryption key is then distributed to users or clients either together with or separately from the watermarked signal y.

[0046] A master signal may be a signal to be distributed to clients or users of the signal. The signal may be distributed via a computer network, via an Electronic Content Distribution (ECD) application, via a record carrier such as a recordabl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to embedding auxiliary data in the form of a multibit payload in a host signal, and encrypting the associated detection key. Moreover, the invention relates to extracting the auxiliary data in the form of the multibit payload from a data signal. Auxiliary data is embedded in a host signal by the following steps. First a reference watermark is provided, subsequently an encrypted detection key associated only with the reference watermark is generated. The encrypted detection key may be a scrambled version of the watermark. In a further step, the multibit watermark is generated and a multibit payload is encoded into the reference watermark. Finally, the multibit watermark is embedded into the host signal.

Description

technical field [0001] The invention relates to a method of embedding auxiliary data in a main signal, in particular embedding a multi-bit watermark and an encryption-related detection key in the signal. Furthermore, the invention relates to a method of extracting auxiliary data from a data signal, in particular a multi-bit watermark from a data signal. The invention also relates to a watermark embedder, a watermark detector and computer readable code. Background technique [0002] Digital watermarks have proven to be an effective deterrent against illicit distribution of copyright material in digital form, for example over computer networks, via Electronic Content Distribution (ECD) applications or via hand-to-hand public distribution. [0003] Watermarking is typically implemented by a precoding stage in which the watermark is generated and a transcoding watermark embedding stage in which the watermark is added to the data signal at a single or a series of locations withi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
CPCG06T1/005
Inventor M·范德维恩A·N·莱马M·U·塞利克
Owner KONINKLIJKE PHILIPS ELECTRONICS NV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products