최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0460730 (2014-08-15) |
등록번호 | US-9153006 (2015-10-06) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 1 인용 특허 : 383 |
Methods and devices are provided to thwart analysis of a watermarking system by preventing analysis of watermarks in a host content. Upon receiving a content at a watermark embedding device, the content is analyzed to ascertain whether one or more test features are present in at least a first portio
Methods and devices are provided to thwart analysis of a watermarking system by preventing analysis of watermarks in a host content. Upon receiving a content at a watermark embedding device, the content is analyzed to ascertain whether one or more test features are present in at least a first portion of the received content. When the analysis reveals that one or more test features are present, embedding of watermarks in at least the first portion of the received content is disabled. The test features of interest include a temporal, a spatial and/or a frequency characteristic such that, if a region of the content that includes test feature is embedded with a watermark, at least one characteristic of the embedded watermark is detectable upon analysis of that region. The test feature can, for example, approximate an impulse signal, a step function signal or a pure sinusoidal signal.
1. A method for thwarting circumvention attempts on a watermarking system, the method comprising: (a) receiving a content at a content handling device that includes embedded watermarks;(b) extracting an embedded watermark from a segment of the received content, the extracted watermark being suitable
1. A method for thwarting circumvention attempts on a watermarking system, the method comprising: (a) receiving a content at a content handling device that includes embedded watermarks;(b) extracting an embedded watermark from a segment of the received content, the extracted watermark being suitable for reporting to a user of the content handling device;(c) using a probability value to make a determination as to whether or not to report the extracted watermark, wherein the determination as to whether or not to report the extracted watermark includes discarding the extracted watermark according to a random value;(d) upon a determination to report the extracted watermark, reporting a value of the extracted watermark or a presence of the extracted watermark;(e) upon a determination not to report the extracted watermark, not reporting information related to the extracted watermark; and(f) repeating operations (b) through (e) for one or more additional embedded watermarks in the received content so that at least one of the extracted watermarks suitable for reporting is not reported. 2. The method of claim 1, wherein discarding the extracted watermark according to the random value includes discarding the extracted watermarks with a probability value of 0.5. 3. The method of claim 1, wherein upon completion of operation (f), none of the extracted watermarks are reported. 4. The method of claim 1, wherein one or more of the watermarks extracted from the received content include a copy control payload that is indicative of a copy control state of the received content. 5. The method of claim 1, further comprising, upon the determination to report the extracted watermark, triggering a restriction on a use of the received content based on a payload value of the extracted watermark(s). 6. A method for thwarting circumvention attempts on a watermarking system, the method comprising: (a) receiving a content at a content handling device that includes embedded watermarks;(b) extracting an embedded watermark from a segment of the received content, the extracted watermark being suitable for reporting to a user of the content handling device;(c) using a probability value to make a determination as to whether or not to report the extracted watermark;(d) upon a determination to report the extracted watermark, reporting a value of the extracted watermark or a presence of the extracted watermark that includes delaying the reporting of the presence or the value of the extracted watermark based on a randomly-assigned value;(e) upon a determination not to report the extracted watermark, not reporting information related to the extracted watermark; and(f) repeating operations (b) through (e) for one or more additional embedded watermarks in the received content to thwart a determination, from the reported watermark value or the reported watermark presence, of an exact location of the extracted watermarks in the content. 7. The method of claim 6, wherein the randomly-assigned value is selected in accordance with a uniform distribution. 8. A method for thwarting circumvention attempts on a watermarking system, the method comprising: (a) receiving a content at a content handling device that includes embedded watermarks;(b) extracting an embedded watermark from a segment of the received content, the extracted watermark being suitable for reporting to a user of the content handling device;(c) using a probability value to make a determination as to whether or not to report the extracted watermark;(d) upon a determination to report the extracted watermark, reporting the presence or the value of the extracted watermark(s) periodically at a predetermined time interval;(e) upon a determination not to report the extracted watermark, not reporting information related to the extracted watermark; and(f) repeating operations (b) through (e) for one or more additional embedded watermarks in the received content to thwart a determination, from the reported watermark value or the reported watermark presence, an exact location of the extracted watermark in the content. 9. The method of claim 8, wherein the predetermined time interval is 5 minutes. 10. A method for thwarting circumvention attempts on a watermarking system, the method comprising: (a) receiving a content at a content handling device that includes embedded watermarks;(b) extracting an embedded watermark from a segment of the received content, the extracted watermark being suitable for reporting to a user of the content handling device;(c) using a probability value to make a determination as to whether or not to report the extracted watermark;(d) upon a determination to report the extracted watermark, reporting of the presence or the value of the extracted watermark(s) on a time-shifted basis;(e) upon a determination not to report the extracted watermark, not reporting information related to the extracted watermark; and(f) repeating operations (b) through (e) for one or more additional embedded watermarks in the received content to thwart a determination, from the reported watermark value or the reported watermark presence, as to which particular segment of the content included the reported watermark(s). 11. A device, comprising: a receiver to receive a content that includes embedded watermarks;a watermark extractor coupled to the receiver to extract one or more embedded watermarks from the received content, the one or more extracted watermarks being suitable for reporting to a user of the device; anda processor to: for each of the one or more extracted watermarks, (A) use a probability value to make a determination as to whether or not to report the extracted watermark(s), wherein the determination as to whether or not to report the extracted watermark includes discarding the extracted watermark according to a random value, (B) upon a determination to report the extracted watermark(s), report corresponding value(s) of the extracted watermark(s) or presence of the extracted watermark(s), and (C) upon a determination not to report the extracted watermark(s), not report the extracted watermark(s) and so that at least one of the extracted watermarks suitable for reporting is not reported. 12. A device, comprising: a processor; anda memory, including program code, the program code, when executed by the processor, configures the device to:(a) receive a content that includes embedded watermarks;(b) extract an embedded watermark from a segment of the received content, the extracted watermark being suitable for reporting to a user of the device;(c) use a probability value to make a determination as to whether or not to report the extracted watermark, wherein the determination as to whether or not to report the extracted watermark includes discarding the extracted watermark according to a random value;(d) upon a determination to report the extracted watermark, report a presence or a value of the extracted watermark;(e) upon a determination not to report the extracted watermark, not report information related to the extracted watermark; and(f) for one or more additional embedded watermarks in the received content, repeat (b) through (e) so that at least one of the extracted watermarks suitable for reporting is not reported. 13. The device of claim 12, wherein discarding the extracted watermark according to the random value includes discarding the extracted watermarks with a probability value of 0.5. 14. The device of claim 12, wherein the program code, when executed by the processor configures the device to extract one or more copy control watermarks that include a payload indicative of a copy control state of the received content. 15. The device of claim 12, wherein the program code, when executed by the processor further configures the device to, upon the determination to report the extracted watermark(s), restrict a use of the received content based on a payload value of the extracted watermark(s). 16. A device, comprising: a processor; anda memory, including program code, the program code, when executed by the processor, configures the device to:(a) receive a content that includes embedded watermarks;(b) extract an embedded watermark from a segment of the received content, the extracted watermark being suitable for reporting to a user of the device;(c) use a probability value to make a determination as to whether or not to report the extracted watermark;(d) upon a determination to report the extracted watermark, report a presence or a value of the extracted watermark that includes delaying the reporting of the presence or the value of the extracted watermark based on a randomly-assigned value;(e) upon a determination not to report the extracted watermark, not report information related to the extracted watermark; and(f) for one or more additional embedded watermarks in the received content, repeat (b) through (e) to thwart a determination, from the reported watermark value or the reported watermark presence, of an exact location of the extracted watermarks in the content. 17. The device of claim 16, wherein the randomly-assigned value is selected in accordance with a uniform distribution. 18. A device, comprising: a processor; anda memory, including program code, the program code, when executed by the processor, configures the device to:(a) receive a content that includes embedded watermarks;(b) extract an embedded watermark from a segment of the received content, the extracted watermark being suitable for reporting to a user of the device;(c) use a probability value to make a determination as to whether or not to report the extracted watermark;(d) upon a determination to report the extracted watermark, report a presence or a value of the extracted watermark periodically at a predetermined time;(e) upon a determination not to report the extracted watermark, not report information related to the extracted watermark; and(f) for one or more additional embedded watermarks in the received content, repeat (b) through (e) to thwart a determination, from the reported watermark value or the reported watermark presence, an exact location of the extracted watermark in the content. 19. The device of claim 18, wherein the predetermined time interval is 5 minutes. 20. A device, comprising: a processor; anda memory, including program code, the program code, when executed by the processor, configures the device to:(a) receive a content that includes embedded watermarks;(b) extract an embedded watermark from a segment of the received content, the extracted watermark being suitable for reporting to a user of the device;(c) use a probability value to make a determination as to whether or not to report the extracted watermark;(d) upon a determination to report the extracted watermark, report a presence or a value of the extracted watermark on a time shifted basis;(e) upon a determination not to report the extracted watermark, not report information related to the extracted watermark; and(f) for one or more additional embedded watermarks in the received content, repeat (b) through (e) to thwart a determination, from the reported watermark value or the reported watermark presence, an exact location of the extracted watermark in the content.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.