Signal continuity assessment using embedded watermarks
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06K-009/00
G06F-021/10
G06F-021/64
G06T-001/00
H04N-001/32
출원번호
US-0733716
(2015-06-08)
등록번호
US-9251322
(2016-02-02)
발명자
/ 주소
Tehranchi, Babak
Petrovic, Rade
Winograd, Joseph M.
Angelico, Dean Anthony
출원인 / 주소
Verance Corporation
대리인 / 주소
Perkins Coie LLP
인용정보
피인용 횟수 :
0인용 특허 :
77
초록▼
Methods, apparatus, and systems for signal continuity assessment using embedded watermarks are provided. The embedded watermarks are recovered from the content and one or more attributes associated with the recovered watermarks are identified. A continuity of the content can then be assessed in acco
Methods, apparatus, and systems for signal continuity assessment using embedded watermarks are provided. The embedded watermarks are recovered from the content and one or more attributes associated with the recovered watermarks are identified. A continuity of the content can then be assessed in accordance with the one or more attributes. The continuity assessment may be based on a variety of factors, including but not limited to a determined heartbeat of the recovered watermarks, a density, separation, location, or extent, of the recovered watermarks, as well as information associated with the watermarks, such as a stego key, channel bits, packet numbers, a fingerprint, or the like.
대표청구항▼
1. A method for improving detection of a change in arrangement of sections of a content, comprising: detecting a first watermark message from a first location of multimedia content, the first detected watermark message being a strong watermark message with an associated first false positive detectio
1. A method for improving detection of a change in arrangement of sections of a content, comprising: detecting a first watermark message from a first location of multimedia content, the first detected watermark message being a strong watermark message with an associated first false positive detection probability value that is below a first predetermined threshold;determining a presence of at least a portion of a second watermark message from a second location of the multimedia content, including: based on watermark symbol values of the detected strong watermark message, constructing a template of watermark symbol values,extracting watermark symbols from the second location of the multimedia content to form at least a portion of a candidate watermark message,comparing all or part of the constructed watermark template to at least the portion of the candidate watermark message to determine, based on an error threshold value, that at least the portion of the second watermark message is present in the multimedia content, the error threshold value corresponding to a predetermined number of errors that, when detected in the candidate watermark message without using the template of watermark symbol values, corresponds to a second false positive detection probability value that is larger than the first predetermined threshold; anddetecting a location of a change in arrangement of the sections of the multimedia content based on at least the portion of the second watermark message, wherein the location of the change is detected with improved granularity compared to detection of the location of the change that is solely based on the first watermark message. 2. The method of claim 1, wherein the watermark symbol values of the second watermark message are identical to corresponding symbol values of the first watermark message. 3. The method of claim 1, wherein the watermark symbol values of the second watermark message have a predefined relationship to corresponding symbols of the first watermark message. 4. The method of claim 3, wherein the predefined relationship includes a difference between the watermark symbol values of the first watermark message and corresponding symbols of the second watermark message due to having a first packet number value in the first watermark message that is different from a second packet number value in the second watermark message. 5. The method of claim 4, further comprising: detecting the first packet number from the first watermark message and the second packet number from the second watermark message, andusing the first packet number and the second packet number to determine whether the change in arrangement of sections of the multimedia content includes a cut, an insertion or a reordering of multimedia content segments. 6. The method of claim 1, wherein the comparing includes comparing a fraction of the constructed watermark template to the candidate watermark message to establish the presence of a fraction of the second watermark message that identifies a boundary of the location of the change in arrangement of the sections of the multimedia content with an improved granularity. 7. The method of claim 1, wherein the comparing includes comparing the entire constructed watermark template to the candidate watermark message to establish the presence of the full second watermark message. 8. A computer program product embodiment on one or more non-transitory computer readable media, comprising: program code for detecting a first watermark message from a first location of a multimedia content, the first detected watermark message being a strong watermark message with an associated first false positive detection probability value that is below a first predetermined threshold;program code for determining a presence of at least a portion of a second watermark message from a second location of the multimedia content, including: based on watermark symbol values of the detected strong watermark message, constructing a template of watermark symbol values,extracting watermark symbols from the second location of the multimedia content to form at least a portion of a candidate watermark message,comparing all or part of the constructed watermark template to at least the portion of the candidate watermark message to determine, based on an error threshold value, that at least the portion of the second watermark message is present in the multimedia content, the error threshold value corresponding to a predetermined number of errors that, when detected in the candidate watermark message without using the template of watermark symbol values, corresponds to a second false positive detection probability value that is above the first predetermined threshold; andprogram code for detecting a location of a change in arrangement of the sections of the multimedia content based on at least the portion of the second watermark message, wherein the location of the change is detected with improved granularity compared to detection of the location of the change that is solely based on the first watermark message. 9. The computer program product of claim 8, wherein the watermark symbol values of the second watermark message are identical to corresponding symbol values of the first watermark message. 10. The computer program product of claim 8, wherein the watermark symbol values of the second watermark message have a predefined relationship to corresponding symbols of the first watermark message. 11. The computer program product of claim 10, wherein the predefined relationship includes a difference between the watermark symbol values of the first watermark message and corresponding symbols of the second watermark message due to having a first packet number value in the first watermark message that is different from a second packet number value in the second watermark message. 12. The computer program product of claim 11, further comprising: program code for detecting the first packet number from the first watermark message and the second packet number from the second watermark message, andprogram code for using the first packet number and the second packet number to determine whether the change in arrangement of sections of the multimedia content includes a cut, an insertion or a reordering of multimedia content segments. 13. The computer program product of claim 8, wherein the comparing includes comparing a fraction of the constructed watermark template to the candidate watermark message to establish the presence of a fraction of the second watermark message that identifies a boundary of the location of the change in arrangement of the sections of the multimedia content with an improved granularity. 14. The computer program product of claim 8, wherein the comparing includes comparing the entire constructed watermark template to the candidate watermark message to establish the presence of the full second watermark message. 15. A device, comprising: a processor; anda memory including processor executable code, the processor executable code, when executed by the processor, causes the processor to:detect a first watermark message from a first location of a multimedia content, the first detected watermark message being a strong watermark message with an associated first false positive detection probability value that is below a first predetermined threshold;determine a presence of at least a portion of a second watermark message from a second location of the multimedia content, including: based on watermark symbol values of the detected strong watermark message, construct a template of watermark symbol values,extract watermark symbols from the second location of the multimedia content to form at least a portion of a candidate watermark message,compare all or part of the constructed watermark template to at least the portion of the candidate watermark message to determine, based on an error threshold value, that at least the portion of the second watermark message is present in the multimedia content, the error threshold value corresponding to a predetermined number of errors that, when detected in the candidate watermark message without using the template of watermark symbol values, corresponds to a second false positive detection probability value that is above the first predetermined threshold; anddetect a location of a change in arrangement of the sections of the multimedia content based on at least the portion of the second watermark message, wherein the location of the change is detected with improved granularity compared to detection of the location of the change that is solely based on the first watermark message. 16. The device of claim 15, wherein the watermark symbol values of the second watermark message are identical to corresponding symbol values of the first watermark message. 17. The device of claim 15, wherein the watermark symbol values of the second watermark message have a predefined relationship to corresponding symbols of the first watermark message. 18. The device of claim 17, wherein the predefined relationship includes a difference between the watermark symbol values of the first watermark message and corresponding symbols of the second watermark message due to having a first packet number value in the first watermark message that is different from a second packet number value in the second watermark message. 19. The device of claim 18, wherein the processor executable code, when executed by the processor, causes the processor to: detect the first packet number from the first watermark message and the second packet number from the second watermark message, anduse the first packet number and the second packet number to determine whether the change in arrangement of sections of the multimedia content includes a cut, an insertion or a reordering of multimedia content segments. 20. The device of claim 15, wherein the processor executable code, when executed by the processor, causes the processor to compare a fraction of the constructed watermark template to the candidate watermark message to establish the presence of a fraction of the second watermark message that identifies a boundary of the location of the change in arrangement of the sections of the multimedia content with an improved granularity. 21. The device of claim 15, wherein the processor executable code, when executed by the processor, causes the processor to compare the entire constructed watermark template to the candidate watermark message to establish the presence of the full second watermark message.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (77)
Bradley,Brett A., Adaptive prediction filtering for digital watermarking.
Petrovic Rade ; Jemili Kanaan ; Winograd Joseph M. ; Metois Eric, Apparatus and method for embedding and extracting information in analog signals using distributed signal features.
Petrovic, Rade, Apparatus and method for embedding and extracting information in analog signals using distributed signal features and replica modulation.
Neusinger, Matthias; Herre, Jürgen; Disch, Sascha; Purnhagen, Heiko; Kjörling, Kristofer; Engdegard, Jonas; Breebaart, Jeroen; Schuijers, Erik; Oomen, Werner, Apparatus and method for generating multi-channel synthesizer control signal and apparatus and method for multi-channel synthesizing.
Lee, Chong U.; Lam, Katherine S.; Nicolas, Julien J.; Atrero, Edward, Digital system for embedding a pseudo-randomly modulated auxiliary data sequence in digital samples.
Rasmussen Harry R. (Tacoma WA) LaBounty Jack D. (Bellevue WA) Rosenow Michael J. (Issaquah WA), Encryption/decryption apparatus with non-accessible table of keys.
Winograd Joseph M. ; Petrovic Rade ; Metois Eric ; Jemili Kanaan, Method and apparatus for preventing removal of embedded information in cover signals.
Rabin, Michael O.; Shasha, Dennis E.; Beinart, Yossi; Caceres, Ramon; Karia, Timir; Molnar, David; Rolinson, Sean, Method and apparatus for protecting information and privacy.
Baum, Peter Georg; Arnold, Michael, Method and apparatus for regaining watermark data that were embedded in an original signal by modifying sections of said original signal in relation to at least two different reference data sequences.
Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Methods and apparatus for enhancing the robustness of watermark extraction from digital host content.
Rhoads, Geoffrey B., Paper products and physical objects as means to access and control a computer or to navigate over or act as a portal on a network.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.