Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

466 results about "Watermark method" patented technology

THE WATERMARK METHOD. Watermark has been, and continues to be, a catalyst for change. Through Watermark, you make the connections that lead to the growth of your businesses, learn valuable leadership skills that lead to promotions and find a community that supports you, educates you and shares your wisdom.

Watermarking scheme for image authentication

A digital watermarking process whereby an invisible watermark inserted into a host image is utilized to determine whether or not the image has been altered and, if so, where in the image such alteration occurred. The watermarking method includes the steps of providing a look-up table containing a plurality of coefficients and corresponding values; transforming the image into a plurality of blocks, wherein each block contains coefficients matching coefficients in the look-up table; and embedding the watermark in the image by performing the following substeps for at least some of the blocks: First, a coefficient is selected for insertion of a marking value representative of a corresponding portion of the watermark. Next, the value of the selected coefficient to used to identify a corresponding value in the look-up table. Finally, the identified coefficient is left unchanged if the corresponding value is the same as the marking value, and is changed if the corresponding value is different from the marking value. After the insertion of the watermark, the image may be stored in a lossy-compression form, thus permitting efficient storage and distribution. Moreover, the method may be used to produce two output signals for authentication: (1) a meaningful pattern to facilitate a quick visual check, and (2) an additional signal to detect unauthorized alteration. The method can be applied to an image compressed using JPEG or other techniques, such as Wavelet compression, and the marked image can be kept in the compressed format. Any alteration made on the marked image can be localized, making the method suitable for use in a "trustworthy" digital camera or camcorder.
Owner:TRUSTEES OF THE UNIV OF PRINCETON THE

Method for robust watermarking of content

One inventive aspect pertains to a watermarking mechanism that allows a watermark to be determined from only a part of the video sequence without human intervention and without reference to the original watermarked frames. This watermark has improved invisibility, detection reliability and robustness. Invisibility is improved through the inclusion of frame difference parameters to calculate the amplitude of the watermark. Detection reliability and robustness can be improved by assuring that opposite signed values for the pseudo-random number sequence are spatially near each other and using data blocks forming the data sets, respectively. Another inventive aspect pertains to a watermarking mechanism that is exclusively dependent on the data contained in the data sets and is completely interoperable between spatial and compressed domains.
Owner:INTEL CORP

Authentication of physical and electronic media objects using digital watermarks

Digital watermark methods for encoding auxiliary data into a host signal are used to authenticate physical and electronic objects. One such method computes a content specific message dependent on the host signal, encodes the content specific message into a watermark signal, and embeds the watermark in the host signal such that the watermark signal is substantially imperceptible in the host signal. One specific implementation embeds data representing salient features of the host signal into the watermark. For example, for photo IDs, the method embeds the spatial location of salient features of the photo into the watermark. Another implementation computes a semi-sensitive hash of the host signal, such as a low pass filtering of the signal, and embeds the hash into the watermark. The watermark signal may be content dependent by making the watermark key dependent on some attribute of the signal in which the watermark is embedded. Another approach is to make the watermark key dependent on a user or an attribute of the user. Yet another approach is to use multiple watermark components and multiple watermark detection stages that help identify and screen out invalid watermark signals. Another digital watermarking method for authenticating a media object transforms a media signal to a frequency domain comprising an array of frequency coefficients. It selects a first set of frequency coefficients, and alters the selected first set of frequency coefficients so that values of the coefficients in the set correspond to a pattern. The pattern of the media signal is authenticated by comparing a pattern of the values of the frequency coefficients in the set with an expected pattern.
Owner:DIGIMARC CORP

Authentication of identification documents using digital watermarks

Digital watermark methods for encoding auxiliary data into a host signal are used to authenticate physical and electronic objects. In one implementation, an identification document includes electronic circuitry. The electronic circuitry includes an image of an authorized bearer of the identification document. The image includes first digital watermarking having a plural-bit identifier. In some cases, the identification document includes a printed image of the authorized bearer of the identification document. The printed image includes second digital watermarking therein. The first digital watermarking and the second digital watermarking can be cross-correlated for authentication of the identification document.
Owner:DIGIMARC CORP +1

Authentication of physical and electronic media objects using digital watermarks

Digital watermark methods for encoding auxiliary data into a host signal are used to authenticate physical and electronic objects. One such method computes a content specific message dependent on the host signal, encodes the content specific message into a watermark signal, and embeds the watermark in the host signal such that the watermark signal is substantially imperceptible in the host signal. One specific implementation embeds data representing salient features of the host signal into the watermark. For example, for photo IDs, the method embeds the spatial location of salient features of the photo into the watermark. Another implementation computes a semi-sensitive hash of the host signal, such as a low pass filtering of the signal, and embeds the hash into the watermark. The watermark signal may be content dependent by making the watermark key dependent on some attribute of the signal in which the watermark is embedded. Another approach is to make the watermark key dependent on a user or an attribute of the user. Yet another approach is to use multiple watermark components and multiple watermark detection stages that help identify and screen out invalid watermark signals. Another digital watermarking method for authenticating a media object transforms a media signal to a frequency domain comprising an array of frequency coefficients. It selects a first set of frequency coefficients, and alters the selected first set of frequency coefficients so that values of the coefficients in the set correspond to a pattern. The pattern of the media signal is authenticated by comparing a pattern of the values of the frequency coefficients in the set with an expected pattern.
Owner:DIGIMARC CORP

Digital watermarking embedding, extracting and quantizing step size coordinating factor optimizing method and device

The invention relates to an embedding, extracting and quantization step size coordination factor optimizing method of a digital watermark and a device thereof. The embodiment of an embedding method of the digital watermark comprises the steps that: an image to be embedded with the digital watermark is divided into image subblocks with preset size; DCT (discrete cosine transform) is executed to the image subblocks; SVD (singular value transform) is executed to the result after DCT so as to obtain a blocking singular value vector of the image subblocks; a texture masking parameter is calculated to obtain a brightness masking parameter; according to a quantization step size coordination factor, the brightness marking parameter and the texture masking parameter of the image subblocks, a self-adaptive quantization step size of the image subblocks is obtained; the self-adaptive quantization step size of the image subblocks and the blocking singular value vector are quantized to obtain a quantization value; amendment is carried out according to the quantization value and the information of the digital watermark to obtain an amendment value of the information of the digital watermark; and the amendment value containing the information of the digital watermark is utilized to obtain the image embedded with the digital watermark. The embodiment of the invention realizes the balance of the invisibility and the robustness of a digital watermarking method.
Owner:STATE GRID CORP OF CHINA +2

Multiple bit digital watermark method capable of resisting printing, scanning and geometric transformation

The invention discloses a multi-bit digital watermark method against the print scanning and the geometric transformation, which comprises the following steps: embedding the watermark in dispersion Fourier amplitude coefficient of the image; determining which Fourier amplitude coefficient every watermark bit embeds in according to the dispersion logarithmic polar coordinate of the Fourier amplitude coefficient; making the watermark detecting and extracting out-of-step when the image is carried out the geometric transformation of the pantographic rotating or the print scanning; synchronizing the information watermark according to the relation of the original mode and embedded mold when the watermark is detected and extracted because the pantograph and the rotating of the image corresponds with the translation of the Fourier logarithmic polar coordinate field at the radial and angel direction; extracting the meaning watermark information bit string; introducing the real interpolation and saving the time because the watermark embedding and detecting process doesn' t need the image interpolation arithmetic for the image and the Fourier amplitude coefficient; protecting the embedded mode. The invention can apply to the copyright protection of the digital image and video, false proof of the file and evidence, the monitoring of video broadcast.
Owner:SUN YAT SEN UNIV

Authentication of Physical and Electronic Media Objects Using Digital Watermarks

Digital watermark methods for encoding auxiliary data into a host signal are used to authenticate physical and electronic objects. One such method computes a content specific message dependent on the host signal, encodes the content specific message into a watermark signal, and embeds the watermark in the host signal such that the watermark signal is substantially imperceptible in the host signal. One specific implementation embeds data representing salient features of the host signal into the watermark. For example, for photo IDs, the method embeds the spatial location of salient features of the photo into the watermark. Another implementation computes a semi-sensitive hash of the host signal, such as a low pass filtering of the signal, and embeds the hash into the watermark. The watermark signal may be content dependent by making the watermark key dependent on some attribute of the signal in which the watermark is embedded. Another approach is to make the watermark key dependent on a user or an attribute of the user. Yet another approach is to use multiple watermark components and multiple watermark detection stages that help identify and screen out invalid watermark signals. Another digital watermarking method for authenticating a media object transforms a media signal to a frequency domain comprising an array of frequency coefficients. It selects a first set of frequency coefficients, and alters the selected first set of frequency coefficients so that values of the coefficients in the set correspond to a pattern. The pattern of the media signal is authenticated by comparing a pattern of the values of the frequency coefficients in the set with an expected pattern.
Owner:DIGIMARC CORP

Watermark Embedding

According to an inventive scheme for introducing a watermark into an information signal, the information signal is at first transferred from a time representation to a spectral / modulation spectral representation). The information signal is then manipulated in the spectral / modulation spectral representation in dependence on the watermark to be introduced to obtain a modified spectral / modulation spectral representation, and subsequently an information signal provided with a watermark is formed based on the modified spectral / modulation spectral representation. An advantage is that, due to the fact that the watermark is embedded and / or derived in the spectral / modulation spectral representation or range, traditional correlation attacks as are used in watermark methods based on a spread-band modulation cannot succeed easily.
Owner:FRAUNHOFER GESELLSCHAFT ZUR FOERDERUNG DER ANGEWANDTEN FORSCHUNG EV

Reversible video frequency watermark method based on interframe forecast error histogram modification

The invention relates to a reversible video frequency watermark method based on interframe forecast error histogram modification, comprising watermark embedding and watermark detection. The watermarkembedding process is carried out according to a video frequency negative sequence: firstly, utilizing the previous frame to carry out motion estimation to obtain an interframe forecast error, and thencarrying out the histogram modification on the interframe forecast error so as to embed a watermark. An extracting process is carried out according to a video frequency sequence mode: similarly, utilizing the previous frame to carry out the motion estimation to obtain a forecast error, and then extracting a watermark from the forecast error, and modifying a histogram to carry out the frame imagerecovery. The invention uses the mode of negative sequence embedding and sequence extracting, thereby an embedded video frequency frame can be recovered after the watermark is extracted, and the reversibility of the video frequency watermark is realized; the motion estimation is used according to the content relation of adjacent interframes to carry out prediction so as to enable the forecast error histogram to have the height centrality, and realize the bigger embedding content; in the embedding process, using the histogram modification enables that the influence on the frame image is small,and a watermark-embedded video frequency has high visual quality.
Owner:BEIHANG UNIV

Digital watermark method capable of simultaneously resisting various attacks

InactiveCN102122385AResistant to clipping attacksResistant to scaling attacksImage data processing detailsWatermark methodBinary information
The invention discloses a digital watermark method capable of simultaneously resisting various attacks, belonging to the field of digital watermark. The invention particularly relates to a digital watermark method capable of simultaneously resisting attacks, such as clipping, scaling, filtering, noise and the like. At present, the most published digital watermark technologies only can resist certain common geometric attacks, noise attacks and filtering attacks, wherein geometric attacks do not contain clipping attacks, only one attack can be resisted once, and the combined attack of various attacks can not be resisted. The invention relates to the digital watermark method which is characterized in that different types of watermark information are embedded into a carrier image, specifically comprising the steps of embedding and extracting the watermark; the watermark can be converted into binary information with a specific length; the watermark becomes a 'pseudo watermark' by coding, correcting errors and adding a watermark head; then, the obtained 'pseudo watermark' is embedded into the carrier image; in the extraction process, the 'pseudo watermark' is obtained firstly; and then an original watermark is obtained. With the method, clipping attack and image scaling attack can be effectively resisted.
Owner:BEIJING UNIV OF TECH

Geometric attack resisting real-time video watermarking method

The invention provides a real-time video watermark method resisting geometric attacks mainly suitable for a video file based on coding. The method directly transforms a partitioning DCT coefficient to an integral DCT coefficient through a quick speed change method, then self-adaptingly modifies a low frequency coefficient value in the integral DCT domain to embedding a watermark signal, transforms a difference value between the watermark embedded integral DCT coefficient and an original coefficient to a difference value of the partitioning DCT coefficient, then rewriting the different value to the partitioning DCT coefficient. The watermark detection is performed in an air space, because a detection process is performed with a video play back, at the same time the video is fully decoded, and is directly performed the integral DCT transformation from the air space, then in order to resist rotary attacks, the detection video is performed a rotary compensation, and is performed a watermark pick-up according to a rule at the embedding time. The results show that the method has very good robustness to a common signal treatment and the conventional geometric attacks (row-column removal, rotation, equal proportion scaling, aspect ratio attack, linear transform, random distortion, cutting and several coalition attacks or the like).
Owner:HUAZHONG UNIV OF SCI & TECH

Robust image watermark method based on local Tchebichef moment

InactiveCN101556686AImprove detection accuracyOvercoming the problem of low detection rateImage data processing detailsImaging processingWatermark method
The invention discloses a robust image watermark new method based on a local Tchebichef moment, mainly solving the problem that a watermark arithmetic based on image characteristic at present can not effectively resist general image processing and geometry attack simultaneously. The method comprises the steps as follows: firstly, extracting characteristic points of an original image by utilizing a Harris-Laplace detection operator, and obtaining a group of stable and mutually independent round characteristic areas through characteristic selection; then obtaining a geometrically unchanged round characteristic area through principle direction alignment; and finally, calculating the Tchebichef moment in an inscribed square image block of the round characteristic area, and embedding a watermark through dithering quantized modulation to modify an amplitude value with low-level Tchebichef moment. In detection, the modified low-level Tchebichef moment is obtained through the dithering quantized modulation, and a minimum distance is utilized to realize the blind extraction of the watermark. The invention has favorable nonvisibility, excellent robust performance for general image processing, geometry attach and combined attach and superior performance to similar methods and can be used for copyright protection for different images.
Owner:XIDIAN UNIV

Novel method of digital watermarking for protecting literary property of music works

The invention belongs to an information safety, multimedia information processing field, in particular, the invention is a new digital watermark method for protecting copyright of a music production, mainly comprises a synchronization code, a watermark embedding and detecting. At first, the invention performs information embedding by segmenting the music production and dividing each music data segment into two front and rear portions. The synchronization code is embeded into the front portion by modifying a statistical average value of a plurality of sampled values, and the rear portion is used for embedding watermark information, the embedding process comprises: performing DWT on the music data segments, then performing DCT on low-frequency coefficients in a wavelet field, embedding the encrypted watermark information in the low / middle frequency coefficients of the DCT field by a self-adaptive quantization method, finally obtaining the digital music production with embeded watermark information by a reverse converting process and re-combining the music data segments. Detecting the digital watermark is a reverse process of the embedding process. The invention can be used in music productions of different types independent of adjustment of a threshold value.
Owner:LIAONING NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products