Methods and devices are provided to embed imperceptible watermarks into a host content and to subsequently extract embedded watermarks in a manner so as to achieve desired levels of robustness, transparency and security. For a particular host content, a first number of embedding opportunities are us
Methods and devices are provided to embed imperceptible watermarks into a host content and to subsequently extract embedded watermarks in a manner so as to achieve desired levels of robustness, transparency and security. For a particular host content, a first number of embedding opportunities are used to insert watermarks, which is less than a number of all embedding opportunities within the host content. Watermarks are extracted from a first number of watermark extraction opportunities, which is less than a number of all watermark extraction opportunities associated with the host content. The relationship between the first number of embedding opportunities, the first number of watermark extraction opportunities and the number of all watermark extraction opportunities is such that a circumvention attempt that overwrites watermarks at all extraction opportunities degrades perceptual quality of the host content below a desired perceptual quality level.
대표청구항▼
1. A method, comprising: receiving a host content, the host content comprising embedded watermarks in a first number of embedding opportunities, wherein the first number of embedding opportunities is less than a number of all embedding opportunities within the host content; andextracting one or more
1. A method, comprising: receiving a host content, the host content comprising embedded watermarks in a first number of embedding opportunities, wherein the first number of embedding opportunities is less than a number of all embedding opportunities within the host content; andextracting one or more of the embedded watermarks by evaluating no more than a first number of watermark extraction opportunities associated with the host content, wherein the first number of watermark extraction opportunities is less than a number of all watermark extraction opportunities associated with the host content, andthe relationship between the first number of embedding opportunities, the first number of watermark extraction opportunities and the number of all watermark extraction opportunities is such that a circumvention attempt that overwrites watermarks at all extraction opportunities degrades perceptual quality of the host content below a desired perceptual quality level. 2. The method of claim 1, wherein the first number of embedding opportunities and the first watermark extraction opportunities are selected to produce a predetermined probability of successful detection of an embedded watermark. 3. The method of claim 1, wherein the first number of extraction opportunities is selected to limit a maximum number of computational operations associated with extracting the one or more embedded watermarks. 4. The method of claim 1, wherein the first number of watermark extraction opportunities and a ratio of the first number of watermark extraction opportunities to the number of all watermark extraction opportunities are selected to produce a particular level of security, and wherein a smaller ratio produces a more secure watermarking system. 5. The method of claim 1, wherein the first number of embedding opportunities and a ratio of the first number of watermark extraction opportunities to the number of all watermark extraction opportunities are selected to simultaneously satisfy a particular probability of successful watermark detection and a desired level of watermark imperceptibility. 6. The method of claim 1, wherein the number of all embedding opportunities and the number of all watermark extraction opportunities associated with the content are different. 7. The method of claim 6, wherein the number of all embedding opportunities is smaller than the number of all watermark extraction opportunities. 8. The method of claim 1, further comprising reporting only a subset of all successfully extracted watermarks from the host content. 9. The method of claim 1, wherein the first number of watermark extraction opportunities corresponds to a first set of watermark extraction locations within the host content,the first set of watermark extraction locations is selected from a plurality of sets of watermark extraction locations, andeach of the plurality of sets of watermark extraction locations constitutes a subset of all watermark extraction locations within the host content. 10. The method of claim 9, wherein the first number of embedding opportunities corresponds to a first set of watermark embedding locations within the host content, andat least one embedding location from the first set of embedding locations coincides with a watermark extraction location within each of the plurality of sets of watermark extraction locations. 11. A device, comprising: a processor and a memory comprising software code that configures the device to:receive a host content, the host content comprising embedded watermarks in a first number of embedding opportunities, wherein the first number of embedding opportunities is less than a number of all embedding opportunities within the host content; andextract one or more of the embedded watermarks by evaluating no more than a first number of watermark extraction opportunities associated with the host content, wherein the first number of watermark extraction opportunities is less than a number of all watermark extraction opportunities associated with the host content, andthe relationship between the first number of embedding opportunities, the first number of watermark extraction opportunities and the number of all watermark extraction opportunities is such that a circumvention attempt that overwrites watermarks at all extraction opportunities degrades perceptual quality of the host content below a desired perceptual quality level. 12. The device of claim 11, wherein the first number of embedding opportunities and the first watermark extraction opportunities are selected to produce a predetermined probability of successful detection of an embedded watermark. 13. The device of claim 11, wherein the first number of extraction opportunities is selected to limit a maximum number of computational operations associated with extracting the one or more embedded watermarks. 14. The device of claim 11, wherein the first number of watermark extraction opportunities and a ratio of the first number of watermark extraction opportunities to the number of all watermark extraction opportunities are selected to produce a particular level of security, and wherein a smaller ratio produces a more secure watermarking system. 15. The device of claim 11, wherein the first number of embedding opportunities and a ratio of the first number of watermark extraction opportunities to the number of all watermark extraction opportunities are selected to simultaneously satisfy a particular probability of successful watermark detection and a desired level of watermark imperceptibility. 16. The device of claim 11, wherein the number of all embedding opportunities and the number of all watermark extraction opportunities associated with the content are different. 17. The device of claim 16, wherein the number of all embedding opportunities is smaller than the number of all watermark extraction opportunities. 18. The device of claim 11, further configured to produce a report that includes only a subset of all successfully extracted watermarks from the host content. 19. The device of claim 11, wherein the first number of watermark extraction opportunities corresponds to a first set of watermark extraction locations within the host content,the first set of watermark extraction locations is selected from a plurality of sets of watermark extraction locations, andeach of the plurality of sets of watermark extraction locations constitutes a subset of all watermark extraction locations within the host content. 20. The device of claim 19, wherein the first number of embedding opportunities corresponds to a first set of watermark embedding locations within the host content, andat least one embedding location from the first set of embedding locations coincides with a watermark extraction location within each of the plurality of sets of watermark extraction locations.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (334)
Iwaki, Satoshi; Nakayama, Akira; Machino, Tamotsu; Kitagishi, Ikuo; Nakamura, Yukihiro, Acoustic signal transmission with insertion signal for machine control.
O\Hagan Michael (LaJolla CA) O\Hagan Nadia K. (LaJolla CA) Hines Frank E. (San Diego CA), Adaptive system for broadcast program identification and reporting.
Petrovic Rade ; Jemili Kanaan ; Winograd Joseph M. ; Metois Eric, Apparatus and method for embedding and extracting information in analog signals using distributed signal features.
Petrovic, Rade, Apparatus and method for embedding and extracting information in analog signals using distributed signal features and replica modulation.
Neusinger, Matthias; Herre, Jürgen; Disch, Sascha; Purnhagen, Heiko; Kjörling, Kristofer; Engdegard, Jonas; Breebaart, Jeroen; Schuijers, Erik; Oomen, Werner, Apparatus and method for generating multi-channel synthesizer control signal and apparatus and method for multi-channel synthesizing.
Jensen James M. (Columbia MD) Graybill Robert B. (Ellicott City MD) Hassan Sayed (Clarksville MD) Lynch Wendell D. (Silver Spring MD) Sabin Wayne (Baldwin MD), Apparatus and methods for including codes in audio signals and decoding.
Jensen James M. ; Lynch Wendell D. ; Perelshteyn Michael M. ; Graybill Robert B. ; Hassan Sayed ; Sabin Wayne, Apparatus and methods for including codes in audio signals and decoding.
Hashemian Hashem M. (Knoxville TN) Kerlin Thomas W. (Concord TN) Upadhyaya Belle R. (Knoxville TN), Apparatus for measuring the degradation of a sensor time constant.
Bronfin Kenneth A. (New York NY) Mahrer Stephen M. (Mt. Holly NJ) Wilson W. Robin (New York NY) Davenport Francis A. (Haddonfield NJ), Arrangement for and method of processing data, especially for identifying and verifying airing of television broadcast p.
Efron Edward (Irvine CA) McPherson James O. (Newport Beach CA) Kim Young B. (Long Beach CA), Audio evaluation of information stored on a record medium under control of video picture frame number.
Guski Richard H. (Red Hook NY) Larson Raymond C. (Rhinebeck NY) Matyas ; Jr. Stephen M. (Masassas VA) Johnson Donald B. (Masassas VA) Coppersmith Don (Ossining NY), Authentication system using one-time passwords.
Kenyon Stephen C. (Stafford VA) Simkins Laura J. (Clarksburg MD) Sebastian Richard L. (Lorton VA), Broadcast information classification system and method.
Lert ; Jr. John G. (9549 La Jolla Shores Dr. La Jolla CA 92037) Lert Peter W. (9549 La Jolla Shores Dr. La Jolla CA 92037) Cornelius John F. (1828 Dora Dr. Cardiff by the Sea CA 92007), Broadcast program identification method and system.
Neubauer, Christian; Eberlein, Ernst; Plankenbuhler, Roland; Heuberger, Albert; Gerhauser, Heinz; Perthold, Rainer; Schott, Hartmut, Coding process for inserting an inaudible data signal into an audio signal, decoding process, coder and decoder.
Sato Masaru (Kodaira JPX) Abe Tetsuya (Tama JPX), Contact-type electroconductive brush for electrically charging an image carrier of an image forming apparatus.
Morales-Garza Fernando (Garza Garcia N.L. MXX) Morales-Garza Oscar (Garza Garcia N.L. MXX) Ortiz-Salinas Jorge E. (Garza Garcia N.L. MXX), Control of rf answer pulses in a TV answer back system.
Waechter Jerome R. (Clearwater FL) Patten James T. (St. Petersburg FL) Kempter Paul C. (Palm Harbor FL), Data collection and transmission system with real time clock.
Osamu Kawamae JP; Toshifumi Takeuchi JP; Hiroshi Yoshiura JP; Takao Arai JP, Data transmission method for embedded data, data transmitting and reproducing apparatuses and information recording medium therefor.
Johan P. M. G. Linnartz NL; Maurice J. J. J-B. Maes NL; Antonius A. C. M. Kalker NL; Geert F. G. Depovere NL; Peter M. J. Rongen NL; Christianus W. F. Vriens NL; Marten E. Van Dijk NL, Device for optically scanning a record carrier.
Schumann,Robert Wilhelm; Whittemore,Richard; Goldschlag,David Mosche; Kravitz,David William; Iu,Siu Leong; Mercier,Guillaume; Bergeron,Michael; Ehrhardt,Jack; Vitkus,Richard, Digital content distribution system and method.
Jones, Thomas C.; Brackenridge, Billy, Digital content distribution, transmission and protection system and method, and portable device for use therewith.
Lee, Chong U.; Lam, Katherine S.; Nicolas, Julien J.; Atrero, Edward, Digital system for embedding a pseudo-randomly modulated auxiliary data sequence in digital samples.
Muratani, Hirofumi, Digital watermark embedding device, digital watermark detection device, digital information distribution device, and, storage medium.
Nakamura,Takao; Ogawa,Hiroshi; Tomioka,Atsuki; Takashima,Youichi, Digital watermark embedding method, digital watermark embedding apparatus, and storage medium storing a digital watermark embedding program.
Alattar,Adnan M.; Levy,Kenneth L.; Stager,Reed R.; Rhoads,Geoffrey B.; Ellingson,Eric E., Digital watermarking and fingerprinting including synchronization, layering, version control, and compressed embedding.
Preuss Robert D. (Boston MA) Roukos Salim E. (Scarsdale NY) Huggins A. W. F. (Arlington MA) Gish Herbert (Newton MA) Bergamo Marcos A. (Wellesley MA) Peterson Patrick M. (Cambridge MA) Derr Alan G. (, Embedded signalling.
Rasmussen Harry R. (Tacoma WA) LaBounty Jack D. (Bellevue WA) Rosenow Michael J. (Issaquah WA), Encryption/decryption apparatus with non-accessible table of keys.
Willis Donald H. (Indianapolis IN), Luma/chroma separation filter with common delay element for comb filter separation and recursive noise reduction of comp.
Fardeau Michel (Les Milles FRX) Briend Michel (Roquevaire FRX) Tommasi Marc (Ventabren FRX) Galant Serge (Aix-en-Provence FRX), Method and apparatus for automatically identifying a program including a sound signal.
Fardeau Michel,FRX ; Briend Michel,FRX ; Tommasi Marc,FRX ; Galant Serge,FRX, Method and apparatus for automatically identifying a program including a sound signal.
Anders Nystrom Per Johan,SEX ; Larsson Carl Johan Henrik,SEX, Method and apparatus for communicating a block of digital information between a sending and a receiving station.
John O. Ryan ; Patrice Capitant ; Clayton L. Davidson ; James Holzgrafe ; Kordian J Kurowski ; Andrew Mellows ; Tony Forrest Rodriquez, Method and apparatus for copy-once watermark for video recording.
Op De Beeck, Marc Joseph Rita; Haitsma, Jaap Andre; Kalker, Antonius Adrianus Cornelis Maria, Method and apparatus for detecting a watermark in a manipulated image.
Zurlinden Everett V. (Dunedin FL), Method and apparatus for determining audience viewing habits by jamming a control signal and identifying the viewers com.
Tewfik Ahmed H. ; Swanson Mitchell D. ; Zhu Bin ; Boney Laurence,FRX, Method and apparatus for embedding data, including watermarks, in human perceptible sounds.
Aijala Victor A. (Arnold MD) Cohen Gerald B. (Gaithersburg MD) Jensen James M. (Columbia MD) Lynch Wendell D. (Silver Spring MD) Urbi Juan C. (Laurel MD), Method and apparatus for encoding/decoding broadcast or recorded segments and monitoring audience exposure thereto.
Young Philip L. (1548 County Rd. 59 Fremont OH 43420) Greenberg Leonard H. (1147 Elm Ave. ; #204 Glendale CA 91201), Method and apparatus for modifying a video signal to inhibit unauthorized videotape recording and subsequent reproductio.
Winograd Joseph M. ; Petrovic Rade ; Metois Eric ; Jemili Kanaan, Method and apparatus for preventing removal of embedded information in cover signals.
Salomon Amnon M. (Springfield VA) Faust Anthony M. (Mundelein IL), Method and apparatus for providing dual language captioning of a television program.
Takeshi Nakamura JP; Kazumi Sugaya JP; Yoshiaki Moriyama JP, Method and apparatus for superposing a digital watermark and method and apparatus for detecting a digital watermark.
Greenberg Burton L. (28 E. 10th St. New York NY 10003), Method and apparatus for the automatic identification and verification of television broadcast programs.
Nagata Atsushi (Hirakata JPX) Uekawa Yutaka (Ashiya JPX) Senoo Takanori (Hirakata JPX) Takahashi Kenichi (Kyoto JPX), Method and apparatus for the protection of signal copy.
Ramsay Thomas E. (Minneapolis MN) Elkins James C. (Golden Valley MN), Method and apparatus for the transmission, storage, and retrieval of documents in an electronic domain.
Copriviza Robert C. (Tarzana CA) Dubin Arnold M. (Calabasas CA) Ackerman Edward B. (Encino CA) Wood Jackson B. (Tarzana CA) Eakins Jeffrey S. (Claremont CA) Harmon David D. (Torrance CA), Method and apparatus for video signal encoding, decoding and monitoring.
Nakamura Takeshi,JPX ; Sugaya Kazumi,JPX ; Oriyama Yoshiaki,JPX, Method and appartus for superposing a digital watermark and method and apparatus for detecting a digital watermark.
Linnartz Johan P. M. G.,NLX, Method and arrangement for detecting a watermark using statistical characteristics of the information signal in which the watermark is embedded.
Ellis Michael D. (Boulder CO) Dunn Stephen M. (Boulder CO) Fellinger Michael W. (Boulder CO) Younglove Fancy B. (Boulder CO) James David M. (Fort Collins CO) Clifton David L. (Boulder CO) Land Richar, Method and system for producing a signature characterizing an audio broadcast signal.
Ellis Michael D. (Boulder CO) Dunn Stephen M. (Boulder CO) Fellinger Michael W. (Boulder CO) Younglove Fancy B. (Boulder CO) James David M. (Fort Collins CO) Clifton David L. (Boulder CO) Land Richar, Method and system for recognition of broadcast segments.
Ellis Michael D. (Boulder CO) Dunn Stephen M. (Boulder CO) Fellinger Michael W. (Boulder CO) Younglove Fancy B. (Boulder CO) James David M. (Fort Collins CO) Clifton David L. (Boulder CO) Land Richar, Method and system for recognition of broadcast segments.
Kramer Robert A. (627 14th St. Santa Monica CA 90402), Method of and system for identification and verification of broadcasting television and radio program segments.
Chow Chee-Seng (Briarcliff Manor NY) Kutten Shay (Rockaway NJ) Yung Marcell Mordechay (New York NY), Method to deter document and intellectual property piracy through individualization.
Thomas William L. (Arapahoe County CO) Sletten Steven J. (Aurora CO) Mathews ; Jr. John W. (Pine CO) Swinehart Jeffrey C. (Arapahoe County CO) Fellinger Michael W. (Boulder CO) Hershey John E. (Bould, Method, apparatus and system for recognizing broadcast segments.
Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Methods and apparatus for enhancing the robustness of watermark extraction from digital host content.
Emma Philip G. (Danbury CT) Knight Joshua W. (Mohegan Lake NY) Pomerene James H. (Chappaqua NY) Rechtschaffen Rudolph N. (Scarsdale NY) Sparacio Frank J. (Sarasota FL), Methods and apparatus for insulating a branch prediction mechanism from data dependent branch table updates that result.
Haselwood Donald E. (Clearwater FL) Thumm Jeffrey R. (Clearwater FL), Monitoring system and method utilizing signal injection for determining channel reception of video receivers.
Haselwood Donald E. (Clearwater FL) Solar Carl M. (Largo FL) Thumm Jeffrey R. (Clearwater FL), Monitoring system for voltage tunable receivers and converters utilizing an analog function generator.
Haselwood Donald E. (Clearwater FL) Solar Carl M. (Largo FL) Thumm Jeffrey R. (Clearwater FL), Monitoring system for voltage tunable receivers and converters utilizing voltage comparison techniques.
Rhoads, Geoffrey B., Paper products and physical objects as means to access and control a computer or to navigate over or act as a portal on a network.
Fenton Patrick,CAX ; Van Dierendonck Albert J., Pseudorandom noise ranging receiver which compensates for multipath distortion by dynamically adjusting the time delay s.
Fenton Patrick (Calgary CAX), Pseudorandom noise ranging receiver which compensates for multipath distortion by making use of multiple correlator time.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Gahagan Dean A. (Kent WA) Ogami Kenneth Y. (Bothell WA), Suppressed clock pulse-duration modulator for direct sequence spread spectrum transmission systems.
Schober Gary W. (Edison NJ) Chadwick Raymond B. (Kearny NJ) Ashley Francis R. (South Plainfield NJ), System and method for identifying a television program.
Schumann Robert W. ; Iu Siu-Leong ; Bugwadia Kobad ; Mercier Guillaume ; Ramadoss Shiva ; Bergeron Michael ; Ehrhardt Jack, System and methodology for tracing to a source of unauthorized copying of prerecorded proprietary material, such as movies.
Sizer ; II Theodore ; August Katherine G. ; Caldwell Charles D. ; Henrick Robert F., System for processing broadcast stream comprises a human-perceptible broadcast program embedded with a plurality of human-imperceptible sets of information.
Brian Chen ; Gregory W. Wornell, System, method, and product for distortion-compensated information embedding using an ensemble of non-intersecting embedding generators.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Smith Gregory L.,CAX ; Wiltshire John H. D.,CAX ; Nolan Marvin C.,CAX, Technique for embedding a code in an audio signal and for detecting the embedded code.
Thomas William L. (Clearwater FL) Kempter Paul C. (Palm Harbor FL) Harkness David H. (Wilton CT), Universal broadcast code and multi-level encoded signal monitoring system.
Thomas William L. (Highlands Ranch CO) Kempter Paul C. (Palm Harbor FL) Harkness David H. (Wilton CT), Universal broadcast code and multi-level encoded signal monitoring system.
Scott D. Beith ; Ning Bi ; Chienchung Chang ; Karthick Chinnaswami ; Andrew P. DeJaco ; Jason B. Kenagy ; Robert Opalsky ; George Pan, Voice recognition user interface for telephone handsets.
Carlson, Albert; Cohen, Steven B.; duBoef, Lawrence; Johnson, H. Stan, Digital watermarking for secure transmission between a source component and a node device.
Courtney, III, Gordon Howard; Hammond, Russell John; McAliley, James Hodges, Encoding and decoding an audio watermark using key sequences comprising of more than two frequency components.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.