Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

462 results about "Watermark method" patented technology

THE WATERMARK METHOD. Watermark has been, and continues to be, a catalyst for change. Through Watermark, you make the connections that lead to the growth of your businesses, learn valuable leadership skills that lead to promotions and find a community that supports you, educates you and shares your wisdom.

Watermarking scheme for image authentication

A digital watermarking process whereby an invisible watermark inserted into a host image is utilized to determine whether or not the image has been altered and, if so, where in the image such alteration occurred. The watermarking method includes the steps of providing a look-up table containing a plurality of coefficients and corresponding values; transforming the image into a plurality of blocks, wherein each block contains coefficients matching coefficients in the look-up table; and embedding the watermark in the image by performing the following substeps for at least some of the blocks: First, a coefficient is selected for insertion of a marking value representative of a corresponding portion of the watermark. Next, the value of the selected coefficient to used to identify a corresponding value in the look-up table. Finally, the identified coefficient is left unchanged if the corresponding value is the same as the marking value, and is changed if the corresponding value is different from the marking value. After the insertion of the watermark, the image may be stored in a lossy-compression form, thus permitting efficient storage and distribution. Moreover, the method may be used to produce two output signals for authentication: (1) a meaningful pattern to facilitate a quick visual check, and (2) an additional signal to detect unauthorized alteration. The method can be applied to an image compressed using JPEG or other techniques, such as Wavelet compression, and the marked image can be kept in the compressed format. Any alteration made on the marked image can be localized, making the method suitable for use in a "trustworthy" digital camera or camcorder.
Owner:TRUSTEES OF THE UNIV OF PRINCETON THE

Authentication of physical and electronic media objects using digital watermarks

Digital watermark methods for encoding auxiliary data into a host signal are used to authenticate physical and electronic objects. One such method computes a content specific message dependent on the host signal, encodes the content specific message into a watermark signal, and embeds the watermark in the host signal such that the watermark signal is substantially imperceptible in the host signal. One specific implementation embeds data representing salient features of the host signal into the watermark. For example, for photo IDs, the method embeds the spatial location of salient features of the photo into the watermark. Another implementation computes a semi-sensitive hash of the host signal, such as a low pass filtering of the signal, and embeds the hash into the watermark. The watermark signal may be content dependent by making the watermark key dependent on some attribute of the signal in which the watermark is embedded. Another approach is to make the watermark key dependent on a user or an attribute of the user. Yet another approach is to use multiple watermark components and multiple watermark detection stages that help identify and screen out invalid watermark signals. Another digital watermarking method for authenticating a media object transforms a media signal to a frequency domain comprising an array of frequency coefficients. It selects a first set of frequency coefficients, and alters the selected first set of frequency coefficients so that values of the coefficients in the set correspond to a pattern. The pattern of the media signal is authenticated by comparing a pattern of the values of the frequency coefficients in the set with an expected pattern.
Owner:DIGIMARC CORP

Authentication of physical and electronic media objects using digital watermarks

Digital watermark methods for encoding auxiliary data into a host signal are used to authenticate physical and electronic objects. One such method computes a content specific message dependent on the host signal, encodes the content specific message into a watermark signal, and embeds the watermark in the host signal such that the watermark signal is substantially imperceptible in the host signal. One specific implementation embeds data representing salient features of the host signal into the watermark. For example, for photo IDs, the method embeds the spatial location of salient features of the photo into the watermark. Another implementation computes a semi-sensitive hash of the host signal, such as a low pass filtering of the signal, and embeds the hash into the watermark. The watermark signal may be content dependent by making the watermark key dependent on some attribute of the signal in which the watermark is embedded. Another approach is to make the watermark key dependent on a user or an attribute of the user. Yet another approach is to use multiple watermark components and multiple watermark detection stages that help identify and screen out invalid watermark signals. Another digital watermarking method for authenticating a media object transforms a media signal to a frequency domain comprising an array of frequency coefficients. It selects a first set of frequency coefficients, and alters the selected first set of frequency coefficients so that values of the coefficients in the set correspond to a pattern. The pattern of the media signal is authenticated by comparing a pattern of the values of the frequency coefficients in the set with an expected pattern.
Owner:DIGIMARC CORP

Multiple bit digital watermark method capable of resisting printing, scanning and geometric transformation

The invention discloses a multi-bit digital watermark method against the print scanning and the geometric transformation, which comprises the following steps: embedding the watermark in dispersion Fourier amplitude coefficient of the image; determining which Fourier amplitude coefficient every watermark bit embeds in according to the dispersion logarithmic polar coordinate of the Fourier amplitude coefficient; making the watermark detecting and extracting out-of-step when the image is carried out the geometric transformation of the pantographic rotating or the print scanning; synchronizing the information watermark according to the relation of the original mode and embedded mold when the watermark is detected and extracted because the pantograph and the rotating of the image corresponds with the translation of the Fourier logarithmic polar coordinate field at the radial and angel direction; extracting the meaning watermark information bit string; introducing the real interpolation and saving the time because the watermark embedding and detecting process doesn' t need the image interpolation arithmetic for the image and the Fourier amplitude coefficient; protecting the embedded mode. The invention can apply to the copyright protection of the digital image and video, false proof of the file and evidence, the monitoring of video broadcast.
Owner:SUN YAT SEN UNIV

Authentication of Physical and Electronic Media Objects Using Digital Watermarks

Digital watermark methods for encoding auxiliary data into a host signal are used to authenticate physical and electronic objects. One such method computes a content specific message dependent on the host signal, encodes the content specific message into a watermark signal, and embeds the watermark in the host signal such that the watermark signal is substantially imperceptible in the host signal. One specific implementation embeds data representing salient features of the host signal into the watermark. For example, for photo IDs, the method embeds the spatial location of salient features of the photo into the watermark. Another implementation computes a semi-sensitive hash of the host signal, such as a low pass filtering of the signal, and embeds the hash into the watermark. The watermark signal may be content dependent by making the watermark key dependent on some attribute of the signal in which the watermark is embedded. Another approach is to make the watermark key dependent on a user or an attribute of the user. Yet another approach is to use multiple watermark components and multiple watermark detection stages that help identify and screen out invalid watermark signals. Another digital watermarking method for authenticating a media object transforms a media signal to a frequency domain comprising an array of frequency coefficients. It selects a first set of frequency coefficients, and alters the selected first set of frequency coefficients so that values of the coefficients in the set correspond to a pattern. The pattern of the media signal is authenticated by comparing a pattern of the values of the frequency coefficients in the set with an expected pattern.
Owner:DIGIMARC CORP

Reversible video frequency watermark method based on interframe forecast error histogram modification

The invention relates to a reversible video frequency watermark method based on interframe forecast error histogram modification, comprising watermark embedding and watermark detection. The watermarkembedding process is carried out according to a video frequency negative sequence: firstly, utilizing the previous frame to carry out motion estimation to obtain an interframe forecast error, and thencarrying out the histogram modification on the interframe forecast error so as to embed a watermark. An extracting process is carried out according to a video frequency sequence mode: similarly, utilizing the previous frame to carry out the motion estimation to obtain a forecast error, and then extracting a watermark from the forecast error, and modifying a histogram to carry out the frame imagerecovery. The invention uses the mode of negative sequence embedding and sequence extracting, thereby an embedded video frequency frame can be recovered after the watermark is extracted, and the reversibility of the video frequency watermark is realized; the motion estimation is used according to the content relation of adjacent interframes to carry out prediction so as to enable the forecast error histogram to have the height centrality, and realize the bigger embedding content; in the embedding process, using the histogram modification enables that the influence on the frame image is small,and a watermark-embedded video frequency has high visual quality.
Owner:BEIHANG UNIV

Digital watermark method capable of simultaneously resisting various attacks

InactiveCN102122385AResistant to clipping attacksResistant to scaling attacksImage data processing detailsWatermark methodBinary information
The invention discloses a digital watermark method capable of simultaneously resisting various attacks, belonging to the field of digital watermark. The invention particularly relates to a digital watermark method capable of simultaneously resisting attacks, such as clipping, scaling, filtering, noise and the like. At present, the most published digital watermark technologies only can resist certain common geometric attacks, noise attacks and filtering attacks, wherein geometric attacks do not contain clipping attacks, only one attack can be resisted once, and the combined attack of various attacks can not be resisted. The invention relates to the digital watermark method which is characterized in that different types of watermark information are embedded into a carrier image, specifically comprising the steps of embedding and extracting the watermark; the watermark can be converted into binary information with a specific length; the watermark becomes a 'pseudo watermark' by coding, correcting errors and adding a watermark head; then, the obtained 'pseudo watermark' is embedded into the carrier image; in the extraction process, the 'pseudo watermark' is obtained firstly; and then an original watermark is obtained. With the method, clipping attack and image scaling attack can be effectively resisted.
Owner:BEIJING UNIV OF TECH

Geometric attack resisting real-time video watermarking method

The invention provides a real-time video watermark method resisting geometric attacks mainly suitable for a video file based on coding. The method directly transforms a partitioning DCT coefficient to an integral DCT coefficient through a quick speed change method, then self-adaptingly modifies a low frequency coefficient value in the integral DCT domain to embedding a watermark signal, transforms a difference value between the watermark embedded integral DCT coefficient and an original coefficient to a difference value of the partitioning DCT coefficient, then rewriting the different value to the partitioning DCT coefficient. The watermark detection is performed in an air space, because a detection process is performed with a video play back, at the same time the video is fully decoded, and is directly performed the integral DCT transformation from the air space, then in order to resist rotary attacks, the detection video is performed a rotary compensation, and is performed a watermark pick-up according to a rule at the embedding time. The results show that the method has very good robustness to a common signal treatment and the conventional geometric attacks (row-column removal, rotation, equal proportion scaling, aspect ratio attack, linear transform, random distortion, cutting and several coalition attacks or the like).
Owner:HUAZHONG UNIV OF SCI & TECH

Robust image watermark method based on local Tchebichef moment

InactiveCN101556686AImprove detection accuracyOvercoming the problem of low detection rateImage data processing detailsImaging processingWatermark method
The invention discloses a robust image watermark new method based on a local Tchebichef moment, mainly solving the problem that a watermark arithmetic based on image characteristic at present can not effectively resist general image processing and geometry attack simultaneously. The method comprises the steps as follows: firstly, extracting characteristic points of an original image by utilizing a Harris-Laplace detection operator, and obtaining a group of stable and mutually independent round characteristic areas through characteristic selection; then obtaining a geometrically unchanged round characteristic area through principle direction alignment; and finally, calculating the Tchebichef moment in an inscribed square image block of the round characteristic area, and embedding a watermark through dithering quantized modulation to modify an amplitude value with low-level Tchebichef moment. In detection, the modified low-level Tchebichef moment is obtained through the dithering quantized modulation, and a minimum distance is utilized to realize the blind extraction of the watermark. The invention has favorable nonvisibility, excellent robust performance for general image processing, geometry attach and combined attach and superior performance to similar methods and can be used for copyright protection for different images.
Owner:XIDIAN UNIV

Novel method of digital watermarking for protecting literary property of music works

The invention belongs to an information safety, multimedia information processing field, in particular, the invention is a new digital watermark method for protecting copyright of a music production, mainly comprises a synchronization code, a watermark embedding and detecting. At first, the invention performs information embedding by segmenting the music production and dividing each music data segment into two front and rear portions. The synchronization code is embeded into the front portion by modifying a statistical average value of a plurality of sampled values, and the rear portion is used for embedding watermark information, the embedding process comprises: performing DWT on the music data segments, then performing DCT on low-frequency coefficients in a wavelet field, embedding the encrypted watermark information in the low / middle frequency coefficients of the DCT field by a self-adaptive quantization method, finally obtaining the digital music production with embeded watermark information by a reverse converting process and re-combining the music data segments. Detecting the digital watermark is a reverse process of the embedding process. The invention can be used in music productions of different types independent of adjustment of a threshold value.
Owner:LIAONING NORMAL UNIVERSITY

DWT-SVD robust blind watermark method based on multilevel DCT

The invention relates to a DWT-SVD robust blind watermark method based on multilevel DCT. The method comprises a watermark embedding method and a watermark extraction method. The watermark embedding method includes the steps that discrete waterlet transformation is conducted on an original image, a low-frequency sub-band of the original image is divided into small blocks, multilevel DCT is conducted on each small block, chaotic encryption is conducted on watermarks to be embedded, multilevel DCT coefficients of each small block form a new matrix, and the encrypted watermarks are embedded into a singular value matrix of each new matrix. The watermark extraction method is the inverse process of the watermark embedding method and includes the steps of extraction of the encrypted watermarks and decryption and restoration of the watermarks through secret keys. According to the method, by the combination of the advantages of DWT and SVD on the digital watermark respect and the utilization of the energy concentration characteristic of multilevel DCT, data of which values are large are acquired, the embedded capacity of the watermarks is increased, the characteristic of being good in robustness is still maintained, and the problem of conflicts between the capacity of the watermarks and robustness is well solved.
Owner:HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products