Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Embedding and detecting watermarks

a technology of watermarks and embedded labels, applied in the field of information security, can solve the problems of not being able to hide any additional information, digital signatures cannot ensure the integrity of documents, and damage to business activities large,

Inactive Publication Date: 2007-01-18
HE YUAN +4
View PDF5 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0005] However, in most real applications, paper is still in an indispensable position. Signed documents are often printed out or faxed. In such cases, since digital signature requires side information (encrypted digest) transmitted together with the electronic document itself, it has noting to do with the case where electronic documents are printed out. Furthermore, digital signature can only ensure the integrity of the document, but cannot hide any additional information that the author will not let others to directly see.
[0010] Thus, an exemplary aspect of the present invention is a watermark embedding method for embedding a secret message sequence in a document. The method includes an obtaining operation of obtaining layout information of the document. An extracting operation is performed to extract a digest of said document by using a Hash function. A calculating operation calculates embedded positions where the secret message sequence is embedded in the document. A hiding operation dispersedly hides the secret message sequence in each of the calculated embedded positions by altering the layout of the document.
[0009] Existing watermarking techniques are mostly symmetric watermarking techniques. In general, the integrity protection by means of symmetric watermarking techniques is realized by firstly encrypting the signature by applying public key algorithms into the digest of the text, and then hiding the encrypted digest into the document by symmetric watermarking techniques. However, for some applications, in addition to the need of verifying the integrity, there exists the need of adding extra secret information, for example, information which the author might not want others to see. If such information is embedded by means of symmetric watermarking, then a person, which is authorized to detect a watermark, can easily forge another watermark without permission, since embedding and extracting of the symmetric watermark can be derived from each other.

Problems solved by technology

For those documents containing sensitive information, even a small revision, such as adding, deleting, or modifying a paragraph, phrase, or word, is not allowed since it may cause great change to the meaning of the content and lead to great damage in business activities.
Furthermore, digital signature can only ensure the integrity of the document, but cannot hide any additional information that the author will not let others to directly see.
Such embedded watermark may be a segment of characters, identification or serial numbers and the like, and is often invisible or unobservable.
Since text watermarking is vulnerable to deliberate destroy, it may encounter big technical challenges when using it for content protection.
But in the application of integrity check, the potential attack is not to remove the watermark, but to modify the meaning of the watermark or the content.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedding and detecting watermarks
  • Embedding and detecting watermarks
  • Embedding and detecting watermarks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be described with reference to embodiments of the invention. The embodiments below do not limit the present invention described in claims and all the combinations of components described in the embodiments are not necessary for means to solve the invention.

[0027] As will be appreciated by one skilled in the art, the present invention may be embodied as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,”“module” or “system.” Furthermore, the present invention may take the form of a computer program product on a computer-usable storage medium having computer-usable program code embodied in the medium.

[0028] Any suitable computer usable or computer readable medium...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A watermark embedding method for embedding a secret message sequence in a document. The techniques include obtaining layout information of the document, extracting a digest of the document by using a Hash function, calculating embedded positions where the secret message sequence is embedded in the document, and dispersedly hiding the secret message sequence in each of the calculated embedded positions by altering the layout of the document. Also provided is a watermark embedding apparatus, a corresponding watermark detecting method and apparatus, and a method and system for detecting document integrity. The integrity of documents in various forms can be detected, and secret information to be hidden can be embedded therein and extracted therefrom. The techniques described are not limited to the document either in soft copy or in hard copy and have good robustness.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS [0001] This application claims priority under 35 U.S.C. §119 to China Patent Application No. 200510084619.6 filed Jul. 14, 2005, the entire text of which is specifically incorporated by reference herein. BACKGROUND OF THE INVENTION [0002] The present invention generally relates to information security fields, and particularly to information security fields utilizing digital watermarking techniques and information hiding techniques. [0003] Paperless office environment and electronic transactions are extensively adopted in current business world. Many important documents, such as wills, forms, identification and contracts, etc., require strict authentication and integrity assurance. For those documents containing sensitive information, even a small revision, such as adding, deleting, or modifying a paragraph, phrase, or word, is not allowed since it may cause great change to the meaning of the content and lead to great damage in business activit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/00
CPCG06F17/212G06T1/0028G06T2201/0051H04L2209/608H04K1/00H04L9/3236H04L2209/16G06T2201/0062G06F40/106
Inventor HE, YUANLUO, LINSU, MINGSHAO, LINGXIANG, ZHE
Owner HE YUAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products