Security enhancements of digital watermarks for multi-media content

a multi-media content and security enhancement technology, applied in image watermarking, digital transmission, instruments, etc., can solve the problems of preventing detection of the presence or removal of encrypted information, failing to provide protection against other types of attacks aimed at preventing legitimate users, embedded watermarks

Inactive Publication Date: 2006-10-26
VERANCE
View PDF99 Cites 371 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0012] It is an object of the present invention to provide methods for design and implementation of digital watermarking systems that overcome various deficiencies of the prior art systems. It is another object of the present invention to provide systematic methods for designing watermarking systems that are arbitrarily secure, robust, transparent to the user, reliable, and cost effective. It is also an object of this invention to anticipate circumvention attempts against the disclosed watermarking systems and render such attempts ineffective. It is another object of the present invention to provide secure methods for generation and distribution of watermarking stego keys. It is a further object of the present invention to provide methods for designing watermarking systems with renewable stego keys. It is also the object of the invention to achieve all of the above without the need to establish a communication link between watermarking embedders and extractors.
[0036] The selecting of the subset of identified embedding opportunities and the selecting of the at least one stego key for extraction of the embedded watermarks may be adapted to produce at least one of optimum security, robustness, transparency, and computational efficiency at a given false positive extraction rate. Further, the selecting of the subset of identified embedding opportunities and the selecting of the at least one stego key for extraction of the embedded watermarks may be adapted to produce a desired tradeoff between levels of robustness, security, and computational efficiency for the embedding and extraction of watermarks. In addition, the selecting of the subset of identified embedding opportunities and the selecting of the at least one stego key for extraction of the embedded watermarks may be adapted to optimize at least two of: security, robustness, transparency, computational efficiency, or false positive extraction rate.

Problems solved by technology

These impairments may be due to various signal processing operations that are typically performed on multimedia content such as lossy compression, scaling, rotation, analog-to-digital conversion, etc., or may be due to noise and distortion sources inherently present in the transmission and / or storage channel of multi-media content.
Examples of this type of noise include errors due to scratches and fingerprints that contaminate data on optical media, noise in over-the-air broadcasts of audio-visual content, tape noise in VHS tapes, everyday handling of currency notes, and the like.
These systems should be distinguished from cryptographic systems where a secret key is used to prevent unauthorized access and / or modification of the information but are not designed to prevent the detection of the presence or the removal of the encrypted information.
Indeed cryptography can be used to protect against unauthorized reading or forgery of watermark data, but it fails to provide protection against other types of attacks that are aimed at preventing the legitimate users from detecting or extracting the embedded watermarks altogether.
A fifth factor in designing practical watermarking systems is computational costs of the embedding and / or extraction units.
For example, watermarks for forensic tracing of piracy channels, such as those that embed different codes in each copy of content distributed over the Internet, may require a simple embedder but a complex and costly forensic extractor.
In certain applications, such as copy control, the probability of false detections must be very low since executing a restrictive action on a legally purchased content is bound to frustrate users and have negative implications for device manufacturers and / or content providers.
These systems also fail to systematically analyze security threats and provide answers to different threat scenarios.
But there are no enabling embodiments that describe how this randomization may take place and how this would affect a watermarking system's design parameters.
This reference also merely states that at any given location of a content one or anther embedding technique may be used but it fails to discuss simultaneous utilization of embedding technologies.
It also fails to discuss joint configuration of embedders and extractors in order to vary levels of robustness / security / transparency / cost.
Second, detection keys constitute a degraded version of the embedder key; this produces a degraded correlation value during the detection process.
Further, this reference also fails to discuss how the robustness / security / transparency needs of the watermarking system can be addressed using a systematic design approach that is suitable for a multitude of applications and needs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security enhancements of digital watermarks for multi-media content
  • Security enhancements of digital watermarks for multi-media content
  • Security enhancements of digital watermarks for multi-media content

Examples

Experimental program
Comparison scheme
Effect test

example 1

Detection

[0186] One detection technique may to be to examine all 159 locations (or even all 288,000 possible locations) in search of the embedded watermarks. Another detection technique may be to examine only the 20 common locations in search of the embedded watermarks. A preferred technique, however, is to search an arbitrary number of watermark locations which includes all or some of the “common” locations. This approach is illustrated in FIG. 11. The underlined search locations in FIG. 11 comprise a subset of “common” embedding locations previously discussed (recall that 20 common watermark locations existed between the 6 embedded content; the extractors of FIG. 11 contain at most 9 of these locations). Thus, in the absence of major channel impairments that interfere with the detection of watermarks, the extractor devices of FIG. 11 are guaranteed to detect embedded watermarks from all 6 content.

[0187] In addition to the common detection locations, there are several other locat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Methods and apparatus for embedding digital watermarks into a digital host content are provided. A digital host content is received, e.g., at a receiver or other device incorporating a receiver. One or more watermark embedding technologies is selected. Multiple embedding opportunities are identified within the host content. A subset of the identified embedding opportunities is selected. A multiplicity of digital watermarks are then embedded into the host content in accordance with the selected subset of embedding opportunities utilizing the one or more selected watermark embedding technologies. The selecting of the subset of embedding opportunities may be adapted to provide a desired tradeoff between levels of robustness, security, and transparency of the watermark. A plurality of watermarking embedding technologies may be selected and used in the embedding step.

Description

BACKGROUND OF THE INVENTION [0001] The present invention relates generally to systems and methods for insertion and subsequent extraction of digital watermarks from multi-media content. More specifically, the invention relates to providing enhanced security to embedded watermarks in multi-media content such as audio, audiovisual and image content. [0002] Digital watermarks are substantially imperceptible signals embedded into a host signal The host signal may be any one of audio, still image, video or any other signal that may be stored on a physical medium, transmitted or broadcast from one point to another or received and exhibited using a variety of display means such as monitors, movie screens, audio speakers or print medium. Digital watermarks are designed to carry auxiliary information without substantially affecting fidelity of the host signal, or without interfering with normal usage of the host signal. For this reason, digital watermarks are sometimes used to carry out cove...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06K9/00H04L9/00G06K9/36G09C5/00H04K1/00
CPCG06T1/0028G06T1/0071G06T2201/0202G10L19/018H04N1/32203G06T1/005H04N1/32299H04N1/32315H04N2201/3233H04L2209/608G09C5/00H04N1/32245
Inventor PETROVIC, RADETEHRANCHI, BABAKWINOGRAD, JOSEPH M.JEMILI, KANAAN
Owner VERANCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products