Electronic watermark embedded device and method and electronic watermark pick up device and method

A technology for electronic watermarking and embedding devices, which is applied to secure communication devices, encoding/decoding devices, electrical components, etc., and can solve problems such as being unsuitable for static images.

Inactive Publication Date: 2005-08-24
SANYO ELECTRIC CO LTD
View PDF1 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, this technique is

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic watermark embedded device and method and electronic watermark pick up device and method
  • Electronic watermark embedded device and method and electronic watermark pick up device and method
  • Electronic watermark embedded device and method and electronic watermark pick up device and method

Examples

Experimental program
Comparison scheme
Effect test

no. 1 approach

[0063] The tamper detection system related to the first embodiment includes figure 2 The watermark embedding device 100 and Figure 4 The watermark extraction device 200. These devices are connected through a network, and the data output by the watermark embedding device 100 is input to the watermark extraction device 200 via the network. Alternatively, a system may be used in which the watermark embedding device 100 is used as a server and the watermark extraction device 200 is used as a client. In addition, these devices may be integrated as one device, and the data output by the watermark embedding device 100 may be stored in the storage device, or the data read from the storage device may be input to the watermark extraction device 200 .

[0064] figure 2 It is a configuration diagram of the watermark embedding device 100 according to the first embodiment. This configuration can be realized in hardware by using the CPU, memory, and other LSIs of any computer, and in ...

no. 2 approach

[0083] The falsification detection system of the second embodiment is also the same as the first embodiment, and although it includes the watermark embedding device 100 and the watermark extraction device 200 , the configuration of the watermark extraction device 200 is different. The watermark embedding device 100 is the same as the first embodiment, so its description will be omitted.

[0084] Image 6 It is a configuration diagram of the watermark extraction device 200 according to the second embodiment. The signature separation unit 40 separates and extracts the key-embedded host data w' and the electronic signature s' from the input signature key-embedded host data w'+s', and gives the key-embedded host data w' to the watermark extraction unit respectively. 44 and the hash generation unit 46 give the electronic signature s′ to the comparison unit 48.

[0085] The watermark extraction unit 44 extracts the key K′ embedded in the key embedding host data w′ as a digital wat...

no. 3 approach

[0090] The falsification detection system according to the third embodiment also includes the watermark embedding device 100 and the watermark extraction device 200 as in the first embodiment, but the configuration of the watermark embedding device 100 is different. The description of the watermark extraction device 200 is omitted because it is the same as the first embodiment, regardless of the influence of the watermark on the hash.

[0091] Figure 8 It is a configuration diagram of the watermark embedding device 100 according to the third embodiment. The watermark embedding device 30 embeds the key K as a digital watermark in the input host data P to generate the key embedding host data w, and gives it to the signature adding unit 36 ​​.

[0092] The hash generator 32 uses a one-way function to map the host data P, generates a hash h, and gives it to the encryption unit 34 . In the first embodiment, the hash generation unit 32 uses a one-way function to map the key-embed...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A watermark embedder embeds a cryptographic key as a digital watermark into input host data and thereby generates key-embedded host data, and then provides it to a hash generator and a signature attacher. A hash generator generates a hash by putting the key-embedded host data into a one-way function, and provides the hash to an encryptor. The encryptor encrypts hash generated by the hash generator with the cryptographic key and thereby generates a digital signature. The signature attacher attaches the digital signature generated by the encryptor to the key-embedded host data generated by the watermark embedder, and outputs the signature-attached key-embedded host data.

Description

technical field [0001] The present invention relates to electronic watermarking (Electronic watermarking) technology, in particular to a key device and method for embedding and extracting electronic watermarking. Background technique [0002] In recent years, the population of Internet users has increased sharply, and it is time to enter the era of broadband, which can be said to be a new stage of Internet use. In broadband communication, the communication frequency band is very wide, so it becomes easy to transmit content with a large amount of data, such as sound, still images, and moving images. As the distribution of such digital content prevails, the protection of the copyright of the content becomes more and more necessary. [0003] The content data circulating on the Internet is easy to be copied by others, and the protection of copyright is still insufficient. Therefore, in order to protect copyrights, research and development are under way to embed information on ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00G09C5/00H04L9/00H04L9/08H04L9/32H04N1/32H04N1/387
CPCH04L2209/608H04N2201/3281H04L9/3247H04N2201/3235
Inventor 国狭亚辉臣井上泰彰
Owner SANYO ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products