Embedding and detecting watermarks

a technology of watermarks and embedded labels, applied in the field of information security, can solve the problems of not being able to hide any additional information, digital signatures cannot ensure the integrity of documents, and damage to business activities large,

Inactive Publication Date: 2007-01-18
HE YUAN +4
View PDF5 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For those documents containing sensitive information, even a small revision, such as adding, deleting, or modifying a paragraph, phrase, or word, is not allowed since it may cause great change to the meaning of the content and lead to great damage in business activities.
Furthermore, digital signature can only ensure the integrity of the document, but cannot hide any additional information that the author will not let others to directly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedding and detecting watermarks
  • Embedding and detecting watermarks
  • Embedding and detecting watermarks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be described with reference to embodiments of the invention. The embodiments below do not limit the present invention described in claims and all the combinations of components described in the embodiments are not necessary for means to solve the invention.

[0027] As will be appreciated by one skilled in the art, the present invention may be embodied as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,”“module” or “system.” Furthermore, the present invention may take the form of a computer program product on a computer-usable storage medium having computer-usable program code embodied in the medium.

[0028] Any suitable computer usable or computer readable medium...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A watermark embedding method for embedding a secret message sequence in a document. The techniques include obtaining layout information of the document, extracting a digest of the document by using a Hash function, calculating embedded positions where the secret message sequence is embedded in the document, and dispersedly hiding the secret message sequence in each of the calculated embedded positions by altering the layout of the document. Also provided is a watermark embedding apparatus, a corresponding watermark detecting method and apparatus, and a method and system for detecting document integrity. The integrity of documents in various forms can be detected, and secret information to be hidden can be embedded therein and extracted therefrom. The techniques described are not limited to the document either in soft copy or in hard copy and have good robustness.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS [0001] This application claims priority under 35 U.S.C. §119 to China Patent Application No. 200510084619.6 filed Jul. 14, 2005, the entire text of which is specifically incorporated by reference herein. BACKGROUND OF THE INVENTION [0002] The present invention generally relates to information security fields, and particularly to information security fields utilizing digital watermarking techniques and information hiding techniques. [0003] Paperless office environment and electronic transactions are extensively adopted in current business world. Many important documents, such as wills, forms, identification and contracts, etc., require strict authentication and integrity assurance. For those documents containing sensitive information, even a small revision, such as adding, deleting, or modifying a paragraph, phrase, or word, is not allowed since it may cause great change to the meaning of the content and lead to great damage in business activit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/00
CPCG06F17/212G06T1/0028G06T2201/0051H04L2209/608H04K1/00H04L9/3236H04L2209/16G06T2201/0062G06F40/106
Inventor HE, YUANLUO, LINSU, MINGSHAO, LINGXIANG, ZHE
Owner HE YUAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products