DE19847942A1 - Inserting security fingerprint into electronic documents by allocating point in hyperplane to each marking point in document - Google Patents
Inserting security fingerprint into electronic documents by allocating point in hyperplane to each marking point in documentInfo
- Publication number
- DE19847942A1 DE19847942A1 DE1998147942 DE19847942A DE19847942A1 DE 19847942 A1 DE19847942 A1 DE 19847942A1 DE 1998147942 DE1998147942 DE 1998147942 DE 19847942 A DE19847942 A DE 19847942A DE 19847942 A1 DE19847942 A1 DE 19847942A1
- Authority
- DE
- Germany
- Prior art keywords
- fingerprints
- fingerprint
- document
- hyperplanes
- assigned
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3226—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of identification information or the like, e.g. ID code, index, title, part of an image, reduced-size image
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3226—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of identification information or the like, e.g. ID code, index, title, part of an image, reduced-size image
- H04N2201/323—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of identification information or the like, e.g. ID code, index, title, part of an image, reduced-size image for tracing or tracking, e.g. forensic tracing of unauthorized copies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3236—Details of authentication information generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3239—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark using a plurality of different authentication information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3269—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
- H04N2201/327—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs which are undetectable to the naked eye, e.g. embedded codes
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Collating Specific Patterns (AREA)
Abstract
Description
Die Erfindung bezieht sich auf ein Verfahren der im Ober begriff des Patentanspruchs 1 näher bezeichneten Art, das im Hauptpatent DE 198 16 356.8-31 beschrieben ist.The invention relates to a method in the upper Concept of claim 1 specified type that is described in the main patent DE 198 16 356.8-31.
Durch das schnelle Wachstum des Internets und die dadurch entstandene Möglichkeit, Dokumente digital zu verbreiten, entsteht ein steigender Bedarf zum Schutz vor illegaler Verbreitung von Dokumenten und damit zum Schutz eines Copy rightinhabers vor Raubkopien.Because of the rapid growth of the Internet and the result opportunity to digitally distribute documents, there is an increasing need to protect against illegal Distribution of documents and thus to protect a copy rightholders from pirated copies.
Zu diesem Zweck arbeiten große Firmen, wie IBM, NEC und Microsoft, aber auch kleinere Firmen, wie Digimarc (siehe Funkschau 17/97; S. 21) und Forschungsinstitute, wie die Fraunhofergesellschaft IGD und die GMD Darmstadt daran, sogenannte digitale Wasserzeichen in Dokumente einzubetten. Bei Verfahren auf dieser Grundlage wird eine Information, die den Copyrightinhaber identifiziert, unsichtbar in die zu schützenden Dokumente eingebracht. Die Art des einge brachten digitalen Wasserzeichens hängt dabei vom jeweili gen Typ des Dokuments ab (z. B. Postscript, JPEG, MPEG-1).Large companies like IBM, NEC and Microsoft, but also smaller companies such as Digimarc (see Funkschau 17/97; P. 21) and research institutes such as the Fraunhofer IGD and GMD Darmstadt Embed so-called digital watermarks in documents. In the process based on this information, that identifies the copyright owner, invisible in the documents to be protected. The type of turned brought digital watermark depends on the respective depending on the type of document (e.g. Postscript, JPEG, MPEG-1).
Digitale Wasserzeichen erlauben es dem Copyrightinhaber, sein geistiges Eigentum an einem illegal verteilten Doku ment nachzuweisen. Digitale Wasserzeichen erlauben es jedoch nicht, den Verursacher der illegalen Verteilung zu ermitteln und ihm die illegale Verteilung nachzuweisen. Digital watermarks allow the copyright owner to his intellectual property on an illegally distributed document evidence. Digital watermarks allow it however, not the culprit of the illegal distribution investigate and prove the illegal distribution.
Digitale Fingerabdrücke gehen einen Schritt weiter. Bei Verwendung des Prinzips der Sicherung eines Dokuments über digitale Fingerabdrücke, wird neben dem digitalen Wasser zeichen des Copyrightinhabers gleichzeitig auch der Name des Kunden, der eine elektronische Kopie des Dokuments erwirbt, unsichtbar in das Dokument eingefügt. Verteilt dieser Kunde seine Kopie nun entgegen den Interessen des Copyrightinhabers weiter, so kann dieser anhand seines in allen illegalen Kopien enthaltenen elektronischen Fingerab drucks eindeutig identifiziert und zur Verantwortung gezo gen werden. (Dan Boneh und James Shaw, Collusion-Secure Fingerprinting for Digital Data. Proc. CRYPTO "95" LNCS 963, Springer-Verlag, Berlin 1995, 452-465.)Digital fingerprints go one step further. At Using the principle of securing a document about digital fingerprints, is next to the digital water the copyright holder's name and name of the customer who has an electronic copy of the document acquires, invisibly inserted into the document. Distributed this customer now copies his copy contrary to the interests of Copyright holder, he can use his in all electronic copies of illegal copies clearly identified and responsible be. (Dan Boneh and James Shaw, Collusion-Secure Fingerprinting for digital data. Proc. CRYPTO "95" LNCS 963, Springer-Verlag, Berlin 1995, 452-465.)
Das Prinzip der Sicherung von Dokumenten mittels digitaler Fingerabdrücke hat bislang eine gravierende Schwachstelle, die daraus resultiert, daß sich die den einzelnen Kunden zugeordneten Dokumente in ihrem Bitmuster genau an der Stelle unterscheiden, an welcher der individuelle nutzer bezogene Fingerabdruck der unterschiedlichen Kunden ange ordnet ist. Gelangt ein Kunde in den Besitz des Dokuments eines zweiten Kunden, oder bildet sich eine Gruppe von Angreifern, so sind diese in der Lage, durch bitweisen Ver gleich der beiden Dokumente die Stellen mit den unter schiedlichen digitalen Fingerabdrücken aufzuspüren und sie aus dem Dokument zu beseitigen (löschen). Mit dem Verfahren nach dem Hauptpatent wird, entsprechend Fig. 1, mit Hilfe sich überlappender endlicher geometrischer Strukturen, die Absicht solcher Manipulationen, eine Kopie des Dokuments zu erhalten, aus dem alle nutzerbezogenen Fingerabdrücke ent fernt sind, teilweise verhindert, weil eine Schnittmenge S der Fingerabdrücke A; B und C gleich ist, nicht entdeckt wird und für Ermittlungen erhalten bleibt. Solche Ermitt lungen sind jedoch bei größeren Gruppen von Angreifern schwierig und können zu mehrdeutigen Ergebnissen führen. The principle of securing documents by means of digital fingerprints has so far had a serious weakness, which results from the fact that the documents assigned to the individual customers differ in their bit pattern precisely at the point at which the individual user-related fingerprint of the different customers is arranged. If a customer comes into possession of a second customer's document, or if a group of attackers forms, they are able, by bit-wise comparison of the two documents, to locate the places with the different digital fingerprints and remove them from the document (Clear). With the method according to the main patent, according to FIG. 1, with the help of overlapping finite geometric structures, the intention of such manipulations to obtain a copy of the document from which all user-related fingerprints are removed is partly prevented because an intersection S of Fingerprints A; B and C is the same, is not discovered and is retained for investigation. However, such investigations are difficult for larger groups of attackers and can lead to ambiguous results.
Die Erfindung hat die Aufgabe, diesen Mangel zu beseitigen, mehr Kopien der Dokumente zu ermöglichen, und auch eine größere Gruppe von Angreifern besser erkennen zu können.The object of the invention is to remedy this deficiency, to allow more copies of the documents, and also one to recognize a larger group of attackers better.
Die zur Lösung dieser Aufgabe vorgeschlagenen Verfahrens schritte sind im Kennzeichen des Patentanspruchs 1 aufge führt.The method proposed to solve this task steps are in the characterizing part of claim 1 leads.
Im Kennzeichen des Patentanspruchs 2 ist eine vorteilhafte Weiterbildungsmöglichkeit zur noch besseren Ermittlung von Löschungsversuchen beschrieben.In the characterizing part of patent claim 2 is an advantageous one Training opportunities for even better determination of Attempted deletion described.
Nachfolgend wird die Erfindung anhand von Ausführungsbei spielen näher beschrieben. In den zugehörigen Zeichnungen zeigen die:The invention will now be described with reference to embodiments play described in more detail. In the accompanying drawings show the:
Fig. 1 die Ermittlung der Schnittmenge S entsprechend dem Hauptpatent, Fig. 1, the determination of the intersection S according to the main patent,
Fig. 2 ein System zu Erzeugung digitaler Fingerabdrücke in der projektiven Ebene PG(2,2) und Fig. 2 shows a system for generating digital fingerprints in the projective level PG (2.2) and
Fig. 3 eine anschauliche Darstellung der Erfindung im dreidimensionalen Raum. Fig. 3 is a descriptive representation of the invention in three-dimensional space.
Die Erfindung beruht auf der Verwendung von Hyperebenen in
endlichen projektiven Räumen PG(d,q). Der Parameter d gibt
dabei die maximale Zahl von Angreifern an, die das System
verarbeiten kann. Die beiden folgenden Anforderungen werden
dabei erfüllt:
The invention is based on the use of hyperplanes in finite projective spaces PG (d, q). The parameter d specifies the maximum number of attackers that the system can process. The following two requirements are met:
- 1. Jeder Kopie des Dokuments ist genau ein Kunde zugeord net.1. Exactly one customer is assigned to each copy of the document net.
- 2. Schließen sich k Kunden mit k < d+1 zusammen und entfer nen aus einem Dokument alle Fingerabdruck-Teile, die sie durch (bitweisen) Vergleich ermitteln können, so können diese k Kunden aus dem manipulierten Dokument eindeutig identifiziert werden.2.Connect and remove k customers with k <d + 1 all fingerprint parts from a document they can determine by (bitwise) comparison, so can these k customers from the manipulated document be clearly identified.
Als Beispiel sei die Erfindung zunächst in der projektiven Ebene PG(2,2) beschrieben. Fig. 2 gibt diese Ebene und die verschiedenen Fingerabdrücke A; B und C wieder.As an example, the invention is first described in the projective level PG (2.2). Fig. 2 gives this level and the different fingerprints A; B and C again.
In Fig. 2 sind alle Punkte und Geraden der projektiven Ebene PG(2,2) eingezeichnet. Jedem Punkt der projektiven Ebene wird mittels einer geheimen Funktion (bzw. Einweg funktion) eine Stelle im Dokument zugewiesen. Kunde a erhält dann ein Dokument, in dem die Stellen markiert sind (z. B. durch Invertieren der Bits an den betreffenden Stel len), die zum Fingerabdruck A gehören. Für den Kunden, dem der Fingerabdruck A zugeordnet wird, wären dies z. B. die Stellen, die den Punkten 1, 5 und 6 zugeordnet sind.In Fig. 2 all points and lines of the projective plane PG (2,2) are drawn. Each point on the projective level is assigned a place in the document using a secret function (or one-way function). Customer a then receives a document in which the positions are marked (e.g. by inverting the bits at the relevant positions) that belong to fingerprint A. For the customer to whom fingerprint A is assigned, this would be e.g. B. the positions assigned to points 1 , 5 and 6 .
Vergleichen nun zwei Kunden ihre Fingerabdrücke, so finden sie alle markierten Stellen, bis auf die eine Stelle, die im Schnittpunkt der beiden Fingerabdrücke liegt. Würden z. B. der Kunde mit dem Fingerabdruck A und der Kunde mit dem Fingerabdruck B ihre Fingerabdrücke vergleichen, so könnten sie die Stellen finden, die den Punkten 2, 4, 5 und 7 entsprechen, nicht aber die Stellen 1, 3 und 6.If two customers compare their fingerprints, they will find all the marked positions, except for the one that is at the intersection of the two fingerprints. Would z. For example, if the customer uses fingerprint A and the customer uses fingerprint B to compare their fingerprints, they could find the locations that correspond to items 2 , 4 , 5, and 7 , but not locations 1 , 3, and 6 .
Eine Identifizierung der Kunden ist aber auch dann noch möglich, wenn sich maximal je zwei Kunden verbünden, denn jede Menge von Schnittpunkten kann nur von genau einem Paar von Kunden übersehen werden. In unserem Beispiel können die Punkte 1, 3, 6 nur genau von den Kunden a und b übersehen werden; Kunde b und c hätten genau die Punkte 1, 2, 7 übersehen, usw.However, customers can still be identified if a maximum of two customers ally each other, because a large number of intersections can only be overlooked by exactly one pair of customers. In our example, points 1 , 3 , 6 can only be overlooked by customers a and b; Customer b and c would have overlooked points 1 , 2 , 7 , etc.
Das oben beschriebene System kann für höhere Dimensionen d und größere Ordnungen q verallgemeinert werden. Im dreidi mensionalen Fall liefert ein Würfel (vgl. Fig. 3) ein an schauliches Bild der Situation: Ein Fingerabdruck besteht aus den Punkten, die auf zwei gegenüberliegenden Seiten des Würfels liegen; je zwei Fingerabdrücke schneiden sich genau in vier Geraden, und je drei in genau acht Punkten. Das bedeutet, daß man aus der Schnittmenge von je zwei (bzw. drei) Fingerabdrücken genau auf die beiden (bzw. drei) Kunden Rückschlüsse ziehen kann, die versucht haben, die Fingerabdrücke zu entfernen.The system described above can be generalized for higher dimensions d and larger orders q. In the three-dimensional case, a cube (see Fig. 3) provides a vivid picture of the situation: a fingerprint consists of the points that lie on two opposite sides of the cube; Two fingerprints intersect exactly in four straight lines, and three each in exactly eight points. This means that from the intersection of two (or three) fingerprints, one can draw conclusions exactly about the two (or three) customers who tried to remove the fingerprints.
Im allgemeinen Fall basiert die Erfindung auf der Verwen
dung von Hyperebenen im projektiven Raum PG(d,q). Jedem
Kunden werden dabei mindestens zwei Hyperebenen zugewiesen,
es können auch mehr sein. Jede Hyperebene darf nur einmal
einem Kunden zugewiesen werden. Für diese Zuweisung gibt es
verschiedene Varianten:
In the general case, the invention is based on the use of hyperplanes in the projective space PG (d, q). Each customer is assigned at least two hyper levels, there may be more. Each hyperplane may only be assigned to a customer once. There are different variants for this assignment:
- 1. Die beiden Hyperebenen werden zufällig ausgewählt. Bei dieser Variante kann es mit geringer Wahrscheinlichkeit dazu kommen, daß der Kreis der Verdächtigen größer ist als der Kreis der Verräter.1. The two hyperplanes are selected at random. At this variant is less likely in addition, the circle of suspects is larger than the traitor circle.
- 2. Die beiden Hyperebenen sind "parallel", d. h. sie schnei den sich in einer ausgewählten Hyperebene H.2. The two hyperplanes are "parallel", i. H. she snows in a selected hyperplane H.
Variante 2 dient dazu, das folgende Problem zu vermeiden:
Die Schnittpunkte der Fingerabdrücke A und B werden in
einem Dokument entdeckt. Dann ist es auch denkbar, daß
diese Schnittpunkte durch Schneiden von Fingerabdruck A und
C, oder durch Fingerabdruck B und C erzeugt wurden.Variant 2 serves to avoid the following problem:
The intersections of fingerprints A and B are discovered in a document. Then it is also conceivable that these intersections were generated by cutting fingerprints A and C, or by fingerprints B and C.
Dieses Problem kann allerdings für große Dimensionen (ab d = 3) vernachlässigt werden: Die Schnittmenge von d Finger abdrücken ist nur mit vernachlässigbar kleiner Wahrschein lichkeit mehrdeutig, und in diesem seltenen Fall erkennt der Dekodieralgorithmus die Mehrdeutigkeit. Die Gefahr, daß Unschuldige verdächtigt werden, besteht also nicht. However, this problem can occur for large dimensions (from d = 3) are neglected: The intersection of d fingers pulling is only possible with a negligible probability ambiguity, and in this rare case recognizes the decoding algorithm the ambiguity. The danger that So innocent people are not suspected.
Zur Dekodierung, d. h. zur Rekonstruktion der Hyperebenen aus den gefundenen Schnittpunkten (bzw. Schnitt- geraden, -ebenen, . . .) sucht man linear abhängige Mengen. Liegen z. B. in PG(d,q) nur die 2d Schnittpunkte der d Hyperebenen vor, so sucht man Teilmengen von je 2d-1 Punkten, die in einer gemeinsamen Hyperebene liegen. Hat man eine solche Hyperebene gefunden, so ist damit auch bereits ein Finger abdruck identifiziert.For decoding, ie for the reconstruction of the hyperplanes from the intersections found (or intersection lines, planes,...) One searches for linearly dependent sets. Lying z. For example, in PG (d, q) only the 2 d intersection points of the d hyperplanes are present, one looks for subsets of 2 d-1 points each that lie in a common hyperplane. If you have found such a hyperplane, a fingerprint has already been identified.
Claims (2)
- 1. jeder Markierungsstelle im Dokument eindeutig ein Punkt des projektiven Raumes PG(d, q) von Hyperebenen mittels geheimer Funktion zugeordnet wird,
- 2. jedem Fingerabdruck mindestens zwei Hyperebenen von PG(d, q) zugeordnet werden, von denen jede nur einem Fingerabdruck exklusiv zugeordnet wird, und daß
- 3. zu jedem Fingerabdruck genau die Markierungsstellen markiert werden, die den Punkten der ausgewählten Hyperebenen entsprechen.
- 1. each marking point in the document is uniquely assigned a point of the projective space PG (d, q) of hyperplanes by means of a secret function,
- 2. at least two hyperplanes of PG (d, q) are assigned to each fingerprint, each of which is exclusively assigned to one fingerprint, and that
- 3. For each fingerprint, the marking points that correspond to the points of the selected hyperplanes are marked.
- 1. aus den im Dokument aufgefundenen markierten Markie rungsstellen die geometrischen Objekte rekonstruiert werden,
- 2. durch Analyse der linearen Abhängigkeiten festgestellt wird, in welchen Hyperebenen die Objekte enthalten sind, und
- 3. durch Berechnung dieser Hyperebenen sukzessive die Fin gerabdrücke der manipulierenden Kunden bestimmt werden.
- 1. the geometric objects are reconstructed from the marked marking locations found in the document,
- 2. by analyzing the linear dependencies, it is determined in which hyperplanes the objects are contained, and
- 3. the fingerprints of the manipulating customers are successively determined by calculating these hyperplanes.
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE1998147942 DE19847942A1 (en) | 1998-04-03 | 1998-10-09 | Inserting security fingerprint into electronic documents by allocating point in hyperplane to each marking point in document |
DE59914374T DE59914374D1 (en) | 1998-10-09 | 1999-07-21 | Method for introducing and analyzing tamper-proof digital fingerprints in electronic documents |
EP99114304A EP0993176B1 (en) | 1998-10-09 | 1999-07-21 | Method to insert and analyse manipulation-secure digital fingerprints in electronic documents |
AT99114304T ATE364963T1 (en) | 1998-10-09 | 1999-07-21 | METHOD FOR INSERTING AND ANALYZING TAMPER-PROOF DIGITAL FINGERPRINTS IN ELECTRONIC DOCUMENTS |
ES99114304T ES2319347T3 (en) | 1998-10-09 | 1999-07-21 | PROCEDURE TO INSERT AND ANALYZE ELECTRONIC DACTILAR FOOTPRINTS RESISTANT TO HANDLING IN ELECTRONIC DOCUMENTS. |
US09/415,538 US6636613B1 (en) | 1998-10-09 | 1999-10-08 | Method for embedding manipulation-secure digital fingerprints into electronic documents |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19816356A DE19816356C2 (en) | 1998-04-03 | 1998-04-03 | Process for inserting tamper-proof digital fingerprints into electronic documents |
DE1998147942 DE19847942A1 (en) | 1998-04-03 | 1998-10-09 | Inserting security fingerprint into electronic documents by allocating point in hyperplane to each marking point in document |
Publications (1)
Publication Number | Publication Date |
---|---|
DE19847942A1 true DE19847942A1 (en) | 2000-04-13 |
Family
ID=26045449
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE1998147942 Ceased DE19847942A1 (en) | 1998-04-03 | 1998-10-09 | Inserting security fingerprint into electronic documents by allocating point in hyperplane to each marking point in document |
Country Status (1)
Country | Link |
---|---|
DE (1) | DE19847942A1 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4972477A (en) * | 1984-06-15 | 1990-11-20 | Campbell Robert J | Encoder/decoder |
EP0660275A2 (en) * | 1993-12-20 | 1995-06-28 | AT&T Corp. | Document copying deterrent method |
US5467447A (en) * | 1990-07-24 | 1995-11-14 | Vogel; Peter S. | Document marking system employing context-sensitive embedded marking codes |
-
1998
- 1998-10-09 DE DE1998147942 patent/DE19847942A1/en not_active Ceased
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4972477A (en) * | 1984-06-15 | 1990-11-20 | Campbell Robert J | Encoder/decoder |
US5467447A (en) * | 1990-07-24 | 1995-11-14 | Vogel; Peter S. | Document marking system employing context-sensitive embedded marking codes |
EP0660275A2 (en) * | 1993-12-20 | 1995-06-28 | AT&T Corp. | Document copying deterrent method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP0879535B1 (en) | Method of marking binary-coded data sets | |
DE69435076T2 (en) | Embedding a steganographic code in an image signal | |
DE69733992T2 (en) | Method for hiding and extracting data | |
DE60217260T2 (en) | Data processing and encryption unit | |
DE10195850B4 (en) | Method of integrating a watermark into a compressed image | |
DE69636084T2 (en) | Method and apparatus for inserting a spread spectrum watermark into multimedia data | |
EP1040662B1 (en) | Method for securing a system protected by key hierarchy | |
DE19964198A1 (en) | Data processing device | |
DE60212128T2 (en) | Image / video communication with watermarks | |
DE60035290T2 (en) | Method and device for finding unauthorized copies of digital objects by means of a fingerprint | |
DE60127553T2 (en) | WATER MARKET PROCESSING AND ARRANGEMENT | |
DE19750779C1 (en) | Traitor tracing or unauthorised user identification method for proprietary data | |
DE60029020T2 (en) | ENCRYPTION AND DECOMPOSITION METHOD OF ELECTRONIC INFORMATION USING INCIDENTIAL PERMUTATIONS | |
EP0948193B1 (en) | Method for insertion of digital manipulation-proof fingerprints in electronic documents | |
EP0993176B1 (en) | Method to insert and analyse manipulation-secure digital fingerprints in electronic documents | |
DE202023105410U1 (en) | Image security improvement system | |
EP1119960B1 (en) | Using a digital watermark for proof of authorship of an electronic document | |
DE19847942A1 (en) | Inserting security fingerprint into electronic documents by allocating point in hyperplane to each marking point in document | |
DE60213817T2 (en) | VIDEO / IMAGE COMMUNICATION WITH WATERMARK | |
DE102018113772B4 (en) | Encryption method | |
EP1002262B1 (en) | Device and method for the protected output of electronically transmitted and stored documents | |
Stephens | We're All Postmodern Now | |
DE60307981T2 (en) | METHOD FOR GENERATING AND VERIFYING DIGITAL SIGNATURES | |
EP3308348B1 (en) | Method for producing a security element with secretly coded information in a graphical image, security element and method for verification | |
EP2187282A1 (en) | Method of operating a system using data protected from unauthorised use |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AF | Is addition to no. |
Ref country code: DE Ref document number: 19816356 Format of ref document f/p: P |
|
OM8 | Search report available as to paragraph 43 lit. 1 sentence 1 patent law | ||
AF | Is addition to no. |
Ref country code: DE Ref document number: 19816356 Format of ref document f/p: P |
|
8110 | Request for examination paragraph 44 | ||
8131 | Rejection |