Encryption-resistant watermarking

A technology of watermarking and ciphertext, applied in the field of encoding information into data content, can solve the problems of copying and distribution of media content, not allowing users to distribute copies of programs, and restrictions

Active Publication Date: 2015-01-07
SYNAMEDIA LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Media content transmitted over communication networks is often subject to copyright
This copyright places strict legal restrictions on how users are allowed to use content they receive from the web
For example, in addition to viewing a live video program, a user may be permitted to record a program for his or her own use, but is generally not permitted to distribute a recorded copy of the program
However, despite these legal restrictions, the unauthorized copying and distribution of media content remains a major problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption-resistant watermarking
  • Encryption-resistant watermarking
  • Encryption-resistant watermarking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] overview

[0023] After applying watermarks to digital content items, content publishers may then wish to inspect traffic in order to detect these watermarks, thereby identifying unauthorized copies of the content item and the source of these copies. Typically, however, communication traffic is encrypted and it becomes difficult or impossible to detect watermarks without first decrypting the traffic. However, content distributors may not be able to obtain the required decryption keys.

[0024] Embodiments of the invention described below can be used to address this difficulty by providing digital watermarks that can be detected even in encrypted data, especially when certain types of blockciphers are used for encryption. For example, when the electronic codebook (ECB) mode of block cipher encryption is used, each plaintext block is encrypted into a corresponding ciphertext block of the same size. In the embodiments described below, the watermark is encoded using a rep...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method and system for providing encryption resistant watermarking of data is described. The method and system comprises encoding a string of symbols, each having a respective symbol value, as a sequence of vectors where each vector includes a respective number of repetitions of a sub-vector of a predefined length, such that the respective number of the repetitions in each vector in the sequence is indicative of the respective symbol value of a corresponding symbol in the string. This sequence of vectors is then inserted into the item of content including digital data to apply a watermark to the item of content. This insertion process may involve interleaving the vectors with gaps of known lengths containing arbitrary data and may involve insertion prior to the vector sequence a marker comprising a concatenation of a number of copies of a marker vector. The length of the sub-vector may be chosen to be an integer divisor of a block size of a block cipher that is to be applied to the item of content after application of the watermark thereto.

Description

technical field [0001] The present invention relates generally to systems and methods for processing data, and in particular to encoding information into data content. Background technique [0002] Media content transmitted over communication networks is often subject to copyright restrictions. This copyright places strict legal restrictions on how users are allowed to use content they receive from the web. For example, in addition to viewing a video program as it is being played, a user may be permitted to record the program for his own use, but the user is generally not permitted to distribute a recorded copy of the program. However, despite these legal restrictions, unauthorized copying and distribution of media content remains a major problem. [0003] In order to identify unauthorized copies and possibly detect their source, content distributors sometimes embed digital watermarks in each copy of encoded media data they distribute. Such watermarks typically include en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/235H04N21/236H04N21/434H04N21/435H04N21/835H04N21/8358
CPCH04N21/835H04N21/4348H04N21/23614H04N21/2351H04N21/4353H04N21/8358G06T1/0021G06T2201/0051G06T2201/0065G06F21/1066G06F21/16H04N21/85
Inventor 伊特斯科·曼廷沙哈尔·索明
Owner SYNAMEDIA LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products