US20060126888A1 - Method and arrangement for watermark detection - Google Patents

Method and arrangement for watermark detection Download PDF

Info

Publication number
US20060126888A1
US20060126888A1 US10/525,489 US52548905A US2006126888A1 US 20060126888 A1 US20060126888 A1 US 20060126888A1 US 52548905 A US52548905 A US 52548905A US 2006126888 A1 US2006126888 A1 US 2006126888A1
Authority
US
United States
Prior art keywords
watermark
graphics card
computer system
luminance signal
signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/525,489
Inventor
Johan Talstra
Job Oostveen
Gerrit Langelaar
Antonius Adrianus Kalker
Maurice Jerome Justin Maes
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koninklijke Philips NV
Original Assignee
Koninklijke Philips Electronics NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics NV filed Critical Koninklijke Philips Electronics NV
Assigned to KONINKLIJKE PHILIPS ELECTRONICS, N.V. reassignment KONINKLIJKE PHILIPS ELECTRONICS, N.V. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MAES, MAURICE JEROME JUSTIN JEAN-BAPTISTE, KALKER, ANTONIUS ADRIANUS CORNELIS MARIA, LANGELAAR, GERRIT CORNELIS, OOSTVEEN, JOB CORNELIS, TALSTRA, JOHAN CORNELIS
Publication of US20060126888A1 publication Critical patent/US20060126888A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0051Embedding of the watermark in the spatial domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0061Embedding of the watermark in each block of the image, e.g. segmented watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0065Extraction of an embedded watermark; Reliable detection
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00884Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a watermark, i.e. a barely perceptible transformation of the original data which can nevertheless be recognised by an algorithm
    • G11B20/00891Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a watermark, i.e. a barely perceptible transformation of the original data which can nevertheless be recognised by an algorithm embedded in audio data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91307Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
    • H04N2005/91335Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal the copy protection signal being a watermark
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/765Interface circuits between an apparatus for recording and another apparatus
    • H04N5/775Interface circuits between an apparatus for recording and another apparatus between a recording apparatus and a television receiver
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/84Television signal recording using optical recording
    • H04N5/85Television signal recording using optical recording on discs or drums

Definitions

  • the invention relates to a method and arrangement for detecting a watermark in a media signal, more particularly in a media signal being played back through a graphics card of a personal computer.
  • FIG. 1 shows schematically such a PC system architecture with watermark-detection for playback-control in the DVD-drive.
  • the PC comprises a DVD-drive 1 , a motherboard 2 with microprocessor and associated circuitry for executing the operating system and application software, and a graphics card 3 .
  • the motherboard is provided with an IDE-bus 4 for transferring data to and from the DVD-drive, and an AGP-slot or PCI-slot 5 for connecting the graphics card.
  • the DVD-drive includes a basic engine 11 for reading data from a DVD disk 6 and a host interface 12 for connecting the drive to the IDE bus.
  • the drive comprises an MPEG2-parser 13 to at least partially decompress the content. Stopping playback of content is symbolically denoted by means of a switch 15 , which is controlled by the watermark detector core 14 .
  • a PC system with playback-control using a watermark detector in the DVD drive leaves major security holes in an open-architecture PC.
  • One such security hole is that content may be recorded in scrambled form by flipping all bits. Since this is no longer a compliant MPEG2 stream, the parser 13 in the drive will fail and no watermark will be seen. The bit-flip can be undone just before or inside the media-player software.
  • Another such security hole is that content may be compressed not using MPEG2, but using other compression schemes such as MPEG4 (popularized under the name DivX), fractal coding, Windows Media, Real, etc.
  • FIG. 1 shows schematically a prior art personal computer architecture with watermark-detection in the DVD-drive.
  • FIG. 2 shows a computer system with a graphics card in accordance with one aspect of the invention.
  • FIG. 3 shows a computer system with a graphics card in accordance with a further aspect of the invention.
  • FIGS. 4A and 4B show screen shots to illustrate the operation of the personal computer, which is shown in FIG. 3 .
  • FIG. 5 shows a diagram of protocols carried out by the personal computer, which is shown in FIGS. 2 and 3 .
  • FIG. 2 shows a computer system with a graphics card 30 (connected to or integrated in the PC motherboard 2 ) in accordance with one aspect of the invention.
  • the graphics card comprises conventional circuits such as an AGP/PCI interface 301 , a display engine 302 , a memory interface 303 , a video RAM 304 , and D/A convertors 305 .
  • a baseband watermark detector 31 is coupled to the output (or multiple outputs) of the graphics card, just before video data is applied to an (external) display screen.
  • the watermark detector 31 controls one or more switches 35 to prevent content from being displayed on the display screen, in accordance with the applicable copy protection algorithm.
  • the switches 35 have the same function as the switch 15 in FIG. 1 .
  • Watermarks are often embedded by ‘tiling’ a small-sized basic watermark pattern over the entire image.
  • the corresponding watermark detector divides the suspect image into image areas of the same size as the basic watermark pattern, accumulates said image areas in a buffer (a process referred to as folding), and checks the buffer for the presence of the basic watermark pattern in the accumulated image area. If the watermark detector 31 is of such a type, the 3 primary colors R,G,B are advantageously accumulated and folded first, using 3 separate fold-buffers.
  • the conversion of RGB to Y is now performed off-line, after folding, instead of on-the-fly. This procedure takes 3 times more memory but that can usually be neglected with respect to the amounts of video-memory used for other purposes. This option requires more memory bandwidth though, because 3 times as much data must be transported to memory.
  • the pixel-clock for normal baseband watermark detection (in PAL or NTSC) is 13.5 MHz.
  • the output interface may thus have an up to 13 ⁇ higher data rate (UXGA-mode) compared to normal PAL/NTSC baseband-detection.
  • UXGA-mode data rate
  • Baseband detection requires one addition for every pixel, so the adder has to work 13 ⁇ faster.
  • the graphics card includes a resolution converter 33 , which sub-samples the pixel-data in space (and possibly also in time): e.g. the only information used for detection is line 1 from frame 1 , line 2 from frame 2 etc. Alternatively, only a part of the images is being watermark detected.
  • FIG. 2 there are multiple outputs on the graphics card.
  • a computer or its graphics card
  • a conventional VGA-output as well as a TV-output for displaying a DVD-movie rendered on the PC on a living-room TV.
  • the digital DVI-interface has been added to this palette. Because all these outputs can be controlled independently (i.e. display different data), naively the number of detectors should equal to the number of outputs, which constitutes a significant cost-burden.
  • the system includes a selector 34 , which time-sequentially selects one of the outputs of the graphics card. It is also possible to check all outputs simultaneously.
  • the potential range of scales that the watermark detector 31 needs to deal with is thus very large.
  • One of the highest scales still preserving visual quality is to display contents (e.g. a full-screen DVD-movie) on the monitor (blow up to 1600 ⁇ 1200 pixels or even more). Roughly the lowest scale is when the video is reduced to 352 ⁇ 200 pixels, which is a popular format for movies downloaded from the internet.
  • the scale-range horizontally is thus 0.5 . . . 2.2 and vertically 0.4 . . . 2.5, whereas currently available watermark detectors are designed to deal with scales in the range 0.5 . . . 1.5.
  • the video output of the computer is examined to locate image areas in which the signal changes from frame to frame.
  • the video is thus distinguished from all the other information on the desktop, because real-time video contains many more changes.
  • a bounding box is then generated around said image areas to provide a (preferably rectangular) area of interest. The bounding box is now considered to constitute the window in which the application runs.
  • FIG. 3 shows schematically a PC in accordance with this aspect of the invention.
  • a pixel activity detector 36 detects and stores (thresholded) changes with respect to the previous frame.
  • a joining circuit 37 fits a bounding box around image areas with significant change. It is well known from the literature how, starting from an area of activity one can determine the tightest possible bounding-box including such a point. Normal watermark detection is subsequently performed, where necessary preceded by scale conversion 32 . In other words, whereas before (cf FIG. 2 ) we had only scale detection and payload detection, we have now added “area-of-interest-detection”.
  • FIG. 4A shows the desktop of a Microsoft Windows® operating system with two application windows 41 and 42 , in which different applications are running.
  • window 42 is generated by a DVD-movie player application.
  • FIG. 4B shows the contents of the area-of-interest as detected by the circuitry ( 36 , 37 ) in the graphics card. If the content in the area-of-interest is upsampled or downsampled to the normal 720 ⁇ 480 or 720 ⁇ 576 format, and supplied to a normal baseband watermark detector, it is very likely that the content is now processed at a scale sufficiently close to 1.0.
  • change-detection 36 may be performed on a sub-sampled video-frame to conserve storage space.
  • the change-detection may also be performed “block-for-block” (e.g. first try to find the change-areas in the top-left corner, then in the top-right corner etc.).
  • FIG. 5 shows schematically a diagram of protocols to make sure that all components are functioning ensure watermark detection.
  • the blocks 16 , 21 , 22 , and 38 denote authentication processes or devices.
  • the DVD-drive 10 checks, on boot-up, whether there is a graphics-card 30 with watermark detector 31 present in the PC. If such a graphics-card with watermark-detector is not present then the drive will not output data. If such a special graphics card is present however, it will output data.
  • the watermark detector 31 in the graphics card detects a watermark it will try to authenticate to a compliant application which is responsible for rendering the watermarked data. If such authentication is successful, the graphics card continues operation (e.g. a valid DVD-Video is being played back using an authorized application). If it cannot find such a compliant application, the content must have come from some non-authorized source, e.g. an illegally copied disk in the drive is being rendered by some pirate or other non-compliant software. The graphics card will then shut down such output through activating the switches 35 (see FIGS. 2 and 3 ), or otherwise destroy the viewing pleasure of the boxed area in which the watermark was detected. Alternatively, a message can be scrolled across the whole image to indicate the detection of a watermark in a non-authenticated stream.
  • the PC runs one or more applications, such as decompressing and rendering possibly watermarked contents obtained from a source such as DVD drive 10 .
  • a source such as DVD drive 10 .
  • the compliant application is certain about the origins of the data which it is rendering because it has also authenticated with the drive.
  • the architecture is more general. More particularly, the source is not necessarily a DVD-drive.
  • the source may also be an analog capture card, an MPEG-encoder card, or an IEEE-1394 board.
  • a hacker may perform the following hack: (s)he copies illegal content which (s)he wants to watch from a DVD+R to the hard disk, without rendering. Then (s)he plays any valid protected DVD-video from the DVD-drive with a compliant application in one window, while the illegal material is rendered by a non-compliant application in another window.
  • the watermark detector will find a watermark (in either one of the windows) but assume that to be consistent with the original movie in the DVD drive. Thus the illegal material is not caught.
  • the illegal content on the hard disk can re-encrypted with CSS (which has been hacked), thus disguising it as valid content. This ReCSS-ed content is thus accepted by the compliant player, and after watermark detection in the graphics card, this application will vouch for it.
  • the detector when the detector has found watermarked content, which (through authentication) can be traced back to a compliant application or drive, the detector continues to search other areas-of-interest, and detect watermarks therein. In practice one could implement this by starting the bounding-box at a random point on the display, to avoid ending up with the same bounding-box all the time. If another watermarked area-of-interest is found, there must also be another compliant application or source. In the absence thereof, illegal contents is being played back, and the graphics card is controlled to act accordingly.
  • the graphics card may notify the drive of the watermark-payload using the authenticated channel set up at boot-time.
  • the drive can verify from the disk whether this watermark-payload is commensurate with this disk. If not, some other source of copied material must exist. Note that for this method to work, the watermark-payload needs to be stored on the disk in a manner that it cannot be retrieved by a hacker, e.g. in some currently unused sector in the lead-in area. This does not add cost to the drive.
  • a hacker may perform the following hack: he inserts a second non-compliant graphics card into the PC. He allows the drive to authenticate to the graphics card (using a hacked driver), while he uses the non-compliant card to playback illegal material from the drive.
  • a second hack scenario is when he only inserts a non-compliant graphics card into his PC but connects the PC via a network (home network or internet) to another PC with a compliant graphics card. After authenticating the drive with the remote compliant graphics-card, illegal content is displayed on the on-board non-compliant graphics card.
  • a third hack scenario is where there is a compliant DVD-drive and a compliant graphics card with watermark detector in a single PC: after authentication the hacker streams the data from illegal disk in the drive to a non-compliant application running on another PC with a non-compliant graphics card somewhere in the network.
  • the operating system and the BIOS are the only entities in the PC which have reliable knowledge about the plug-in card configuration of the PC.
  • a solution for the first hack-scenario is for the BIOS or OS to prohibit combinations of compliant and non-compliant graphics cards in a PC (for security reasons).
  • a solution for the second hack-scenario is for OS and BIOS to disallow authentication with graphics cards across the network. A way to implement this would be for the OS to query the drive which graphics card it authenticated with and to check that the device is indeed on board. This obviously requires a secure OS. If it is a market requirement that playback from a remote DVD-drive in a home network should be allowed, the second scenario hack of problem 7 cannot be prevented.
  • Another solution is for the OS to prohibit combinations of compliant drive and non-compliant graphics card in the same box.
  • the invention may be summarized as follows. Watermark-detection in the graphics card of a personal computer, for the purpose of copy-protection, has recently started to draw a lot of attention in standardization. Detection in the graphics card has problems completely different from the formerly considered detection in the DVD-drive, having to do with high data-rates, large scale-ranges and presence of multiple video-streams in the display area.
  • This invention proposes conversion ( 32 ) of the computer's RGB output into a luminance signal (Y) prior to watermark detection by a conventional watermark detector ( 31 ) being arranged to detect the watermark in a such a luminance signal.
  • the resolution of the monitor image to be inspected is preferably converted ( 33 ) to the conventional TV resolution of the (MPEG2-compressed) contents being played back on the computer's DVD drive.
  • the same watermark detector may be time-sequentiall connected ( 34 ) to each of the outputs.

Abstract

Watermark-detection in the graphics card of a personal computer, for the purpose of copy-protection, has recently started to draw a lot of attention in standardization. Detection in the graphics card has problems completely different from the formerly considered detection in the DVD-drive, having to do with high data-rates, large scale-ranges and presence of multiple video-streams in the display area. This invention proposes conversion (32) of the computer's RGB output into a luminance signal (Y) prior to watermark detection by a conventional watermark detector (31) being arranged to detect the watermark in a such a luminance signal. The resolution of the monitor image to be inspected is preferably converted (33) to the conventional TV resolution of the (MPEG2-compressed) contents being played back on the computer's DVD drive. In graphic cards providing multiple outputs (VGA, TV, DVI), the same watermark detector may be time-sequentiall connected (34) to each of the outputs.

Description

    FIELD OF THE INVENTION
  • The invention relates to a method and arrangement for detecting a watermark in a media signal, more particularly in a media signal being played back through a graphics card of a personal computer.
  • BACKGROUND OF THE INVENTION
  • Until very recently the DVD copy-protection community considered watermark-detection for playback-control in a personal computer to take place in the DVD-ROM or DVD-rewriter drive. The motivation for this position was that watermark-detection is a permissive technology (i.e. the playback or recording device works with or without watermark detector) as opposed to encryption, which requires a decryptor for the device to function properly. The fragile consensus used to be that DVD-ROM drives would inspect MPEG2-compressed unencrypted DVD-video content on disks for presence of a copy-never or copy-once watermark. If such were the case, playback should be stopped (because copy-once or copy-never content should be encrypted at all times).
  • FIG. 1 shows schematically such a PC system architecture with watermark-detection for playback-control in the DVD-drive. The PC comprises a DVD-drive 1, a motherboard 2 with microprocessor and associated circuitry for executing the operating system and application software, and a graphics card 3. The motherboard is provided with an IDE-bus 4 for transferring data to and from the DVD-drive, and an AGP-slot or PCI-slot 5 for connecting the graphics card. The DVD-drive includes a basic engine 11 for reading data from a DVD disk 6 and a host interface 12 for connecting the drive to the IDE bus. In order to enable watermark detection by a watermark detector core 14, the drive comprises an MPEG2-parser 13 to at least partially decompress the content. Stopping playback of content is symbolically denoted by means of a switch 15, which is controlled by the watermark detector core 14.
  • However, a PC system with playback-control using a watermark detector in the DVD drive leaves major security holes in an open-architecture PC. One such security hole is that content may be recorded in scrambled form by flipping all bits. Since this is no longer a compliant MPEG2 stream, the parser 13 in the drive will fail and no watermark will be seen. The bit-flip can be undone just before or inside the media-player software. Another such security hole is that content may be compressed not using MPEG2, but using other compression schemes such as MPEG4 (popularized under the name DivX), fractal coding, Windows Media, Real, etc. Since it is impossible for the DVD-drive to have parsers on board for all of these formats (and hackers will invent new codecs to outsmart the drive), the watermark will not be detected. Although (illegal) copies compressed with a codec other than MPEG2 will generally not play on current DVD-video players there is a trend for DVD-video players to support more and more codecs.
  • Therefore it has already been proposed to place the watermark detector after decompression and just before rendering, i.e. in an MPEG-decoder card or in a graphics card. After decompression there is no longer confusion because all content reduces to the unequivocal baseband-format ready for consumption by human eyes. Initially, it was considered difficult to enforce MPEG-decoder companies or graphics-card manufacturers to install such watermark detectors. This perception has changed since.
  • Although it is architecturally very simple and clean to detect watermarks in the graphics-card, in practice there are a number of problems with this location, due to the enormous amounts of data that flow through the graphics card at huge speed, and due to the fact that multiple streams can be displayed at the same time.
  • OBJECT AND SUMMARY OF THE INVENTION
  • It is an object of the invention to provide a solution for the above-identified problems. To this end, the invention provides methods and arrangements as defined in the independent claims. Advantageous embodiments are defined in the dependent claims.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 shows schematically a prior art personal computer architecture with watermark-detection in the DVD-drive.
  • FIG. 2 shows a computer system with a graphics card in accordance with one aspect of the invention.
  • FIG. 3 shows a computer system with a graphics card in accordance with a further aspect of the invention.
  • FIGS. 4A and 4B show screen shots to illustrate the operation of the personal computer, which is shown in FIG. 3.
  • FIG. 5 shows a diagram of protocols carried out by the personal computer, which is shown in FIGS. 2 and 3.
  • DESCRIPTION OF EMBODIMENTS
  • FIG. 2 shows a computer system with a graphics card 30 (connected to or integrated in the PC motherboard 2) in accordance with one aspect of the invention. The graphics card comprises conventional circuits such as an AGP/PCI interface 301, a display engine 302, a memory interface 303, a video RAM 304, and D/A convertors 305. A baseband watermark detector 31 is coupled to the output (or multiple outputs) of the graphics card, just before video data is applied to an (external) display screen. The watermark detector 31 controls one or more switches 35 to prevent content from being displayed on the display screen, in accordance with the applicable copy protection algorithm. The switches 35 have the same function as the switch 15 in FIG. 1.
  • One of the problems is that the data on the output(s) is in RGB format whereas most watermark-schemes work with the luminance channel. Conversion from the RGB format to luminance Y according to the well-known formula (Y/0.587)≡0.509 R+G+0.194 B (where 0≦R,G,B<1) requires 2 additions and 2 multiplications. This is very costly, especially at high data rates.
  • In the system according to the invention, an RGB-to-Y converter 32 avoids multiplications by approximating Y, e.g. Y≈0.25 R+0.5 G+0.125 B=R/4+G/2+B/8 which can be implemented with only arithmetic shifts. In an embodiment, which even prevents additions, the converter simply selects the green color signal so that Y≈G (because G is dominant).
  • Watermarks are often embedded by ‘tiling’ a small-sized basic watermark pattern over the entire image. The corresponding watermark detector divides the suspect image into image areas of the same size as the basic watermark pattern, accumulates said image areas in a buffer (a process referred to as folding), and checks the buffer for the presence of the basic watermark pattern in the accumulated image area. If the watermark detector 31 is of such a type, the 3 primary colors R,G,B are advantageously accumulated and folded first, using 3 separate fold-buffers. The conversion of RGB to Y is now performed off-line, after folding, instead of on-the-fly. This procedure takes 3 times more memory but that can usually be neglected with respect to the amounts of video-memory used for other purposes. This option requires more memory bandwidth though, because 3 times as much data must be transported to memory.
  • Another problem associated with the architecture, which is shown in FIG. 2, is that the video coming out of the graphics-card can be at any number of resolutions, as is illustrated in the following Table:
    TABLE
    Comparison of the resolutions and pixel-clock of some
    common graphics standards
    Standard Resolution pixel-clock [MHz]
    VGA 640 × 480  27
    XGA 1024 × 768   70
    SXGA 1280 × 1024 116
    UXGA 1600 × 1200 170
  • There are other also other standards supported by some graphics cards, with interpolating resolutions. Note that the pixel-clock for normal baseband watermark detection (in PAL or NTSC) is 13.5 MHz. The output interface may thus have an up to 13× higher data rate (UXGA-mode) compared to normal PAL/NTSC baseband-detection. Baseband detection requires one addition for every pixel, so the adder has to work 13× faster.
  • To alleviate this problem, the graphics card includes a resolution converter 33, which sub-samples the pixel-data in space (and possibly also in time): e.g. the only information used for detection is line 1 from frame 1, line 2 from frame 2 etc. Alternatively, only a part of the images is being watermark detected.
  • Further, as shown in FIG. 2, there are multiple outputs on the graphics card. Currently, a computer (or its graphics card) is provided with a conventional VGA-output as well as a TV-output for displaying a DVD-movie rendered on the PC on a living-room TV. Recently the digital DVI-interface has been added to this palette. Because all these outputs can be controlled independently (i.e. display different data), naively the number of detectors should equal to the number of outputs, which constitutes a significant cost-burden.
  • This problem is solved by time-multiplexing the watermark detector onto the different outputs: i.e. first detect for a fixed amount of time on output 1, then on output 2 etc. To this end, the system includes a selector 34, which time-sequentially selects one of the outputs of the graphics card. It is also possible to check all outputs simultaneously.
  • There are a number of further problems associated with detecting a watermark in the signal being generated by the graphics card of a personal computer. These further problems are caused by the fact that a personal computer is generally able to simultaneously execute a plurality of applications in respective ‘windows’ of the display screen. Each window may often be arbitrarily positioned and scaled by the user.
  • The potential range of scales that the watermark detector 31 needs to deal with is thus very large. One of the highest scales still preserving visual quality is to display contents (e.g. a full-screen DVD-movie) on the monitor (blow up to 1600×1200 pixels or even more). Roughly the lowest scale is when the video is reduced to 352×200 pixels, which is a popular format for movies downloaded from the internet. The scale-range horizontally is thus 0.5 . . . 2.2 and vertically 0.4 . . . 2.5, whereas currently available watermark detectors are designed to deal with scales in the range 0.5 . . . 1.5.
  • In accordance with a second aspect of the invention, the video output of the computer is examined to locate image areas in which the signal changes from frame to frame. The video is thus distinguished from all the other information on the desktop, because real-time video contains many more changes. A bounding box is then generated around said image areas to provide a (preferably rectangular) area of interest. The bounding box is now considered to constitute the window in which the application runs.
  • FIG. 3 shows schematically a PC in accordance with this aspect of the invention. In this Figure, a pixel activity detector 36 detects and stores (thresholded) changes with respect to the previous frame. A joining circuit 37 fits a bounding box around image areas with significant change. It is well known from the literature how, starting from an area of activity one can determine the tightest possible bounding-box including such a point. Normal watermark detection is subsequently performed, where necessary preceded by scale conversion 32. In other words, whereas before (cf FIG. 2) we had only scale detection and payload detection, we have now added “area-of-interest-detection”.
  • To illustrate the operation of this PC architecture, FIG. 4A shows the desktop of a Microsoft Windows® operating system with two application windows 41 and 42, in which different applications are running. In this example, window 42 is generated by a DVD-movie player application. FIG. 4B shows the contents of the area-of-interest as detected by the circuitry (36, 37) in the graphics card. If the content in the area-of-interest is upsampled or downsampled to the normal 720×480 or 720×576 format, and supplied to a normal baseband watermark detector, it is very likely that the content is now processed at a scale sufficiently close to 1.0.
  • It should be noted that the change-detection 36 may be performed on a sub-sampled video-frame to conserve storage space. The change-detection may also be performed “block-for-block” (e.g. first try to find the change-areas in the top-left corner, then in the top-right corner etc.).
  • A further aspect of the invention relates to acting on the detected presence or absence of the watermark. FIG. 5 shows schematically a diagram of protocols to make sure that all components are functioning ensure watermark detection. The blocks 16, 21, 22, and 38 denote authentication processes or devices. In this architecture being envisaged, the DVD-drive 10 checks, on boot-up, whether there is a graphics-card 30 with watermark detector 31 present in the PC. If such a graphics-card with watermark-detector is not present then the drive will not output data. If such a special graphics card is present however, it will output data.
  • When the watermark detector 31 in the graphics card detects a watermark it will try to authenticate to a compliant application which is responsible for rendering the watermarked data. If such authentication is successful, the graphics card continues operation (e.g. a valid DVD-Video is being played back using an authorized application). If it cannot find such a compliant application, the content must have come from some non-authorized source, e.g. an illegally copied disk in the drive is being rendered by some pirate or other non-compliant software. The graphics card will then shut down such output through activating the switches 35 (see FIGS. 2 and 3), or otherwise destroy the viewing pleasure of the boxed area in which the watermark was detected. Alternatively, a message can be scrolled across the whole image to indicate the detection of a watermark in a non-authenticated stream.
  • The PC runs one or more applications, such as decompressing and rendering possibly watermarked contents obtained from a source such as DVD drive 10. Note that the compliant application is certain about the origins of the data which it is rendering because it has also authenticated with the drive. Note also that the architecture is more general. More particularly, the source is not necessarily a DVD-drive. For example, the source may also be an analog capture card, an MPEG-encoder card, or an IEEE-1394 board.
  • In the architectures shown above, a hacker may perform the following hack: (s)he copies illegal content which (s)he wants to watch from a DVD+R to the hard disk, without rendering. Then (s)he plays any valid protected DVD-video from the DVD-drive with a compliant application in one window, while the illegal material is rendered by a non-compliant application in another window. The watermark detector will find a watermark (in either one of the windows) but assume that to be consistent with the original movie in the DVD drive. Thus the illegal material is not caught. It is even possible to abuse a compliant application: the illegal content on the hard disk can re-encrypted with CSS (which has been hacked), thus disguising it as valid content. This ReCSS-ed content is thus accepted by the compliant player, and after watermark detection in the graphics card, this application will vouch for it.
  • Therefore, when the detector has found watermarked content, which (through authentication) can be traced back to a compliant application or drive, the detector continues to search other areas-of-interest, and detect watermarks therein. In practice one could implement this by starting the bounding-box at a random point on the display, to avoid ending up with the same bounding-box all the time. If another watermarked area-of-interest is found, there must also be another compliant application or source. In the absence thereof, illegal contents is being played back, and the graphics card is controlled to act accordingly.
  • As an alternative the graphics card may notify the drive of the watermark-payload using the authenticated channel set up at boot-time. The drive can verify from the disk whether this watermark-payload is commensurate with this disk. If not, some other source of copied material must exist. Note that for this method to work, the watermark-payload needs to be stored on the disk in a manner that it cannot be retrieved by a hacker, e.g. in some currently unused sector in the lead-in area. This does not add cost to the drive.
  • A hacker may perform the following hack: he inserts a second non-compliant graphics card into the PC. He allows the drive to authenticate to the graphics card (using a hacked driver), while he uses the non-compliant card to playback illegal material from the drive. A second hack scenario is when he only inserts a non-compliant graphics card into his PC but connects the PC via a network (home network or internet) to another PC with a compliant graphics card. After authenticating the drive with the remote compliant graphics-card, illegal content is displayed on the on-board non-compliant graphics card. A third hack scenario is where there is a compliant DVD-drive and a compliant graphics card with watermark detector in a single PC: after authentication the hacker streams the data from illegal disk in the drive to a non-compliant application running on another PC with a non-compliant graphics card somewhere in the network.
  • The operating system and the BIOS are the only entities in the PC which have reliable knowledge about the plug-in card configuration of the PC. A solution for the first hack-scenario is for the BIOS or OS to prohibit combinations of compliant and non-compliant graphics cards in a PC (for security reasons). A solution for the second hack-scenario is for OS and BIOS to disallow authentication with graphics cards across the network. A way to implement this would be for the OS to query the drive which graphics card it authenticated with and to check that the device is indeed on board. This obviously requires a secure OS. If it is a market requirement that playback from a remote DVD-drive in a home network should be allowed, the second scenario hack of problem 7 cannot be prevented. Another solution is for the OS to prohibit combinations of compliant drive and non-compliant graphics card in the same box.
  • The invention may be summarized as follows. Watermark-detection in the graphics card of a personal computer, for the purpose of copy-protection, has recently started to draw a lot of attention in standardization. Detection in the graphics card has problems completely different from the formerly considered detection in the DVD-drive, having to do with high data-rates, large scale-ranges and presence of multiple video-streams in the display area. This invention proposes conversion (32) of the computer's RGB output into a luminance signal (Y) prior to watermark detection by a conventional watermark detector (31) being arranged to detect the watermark in a such a luminance signal. The resolution of the monitor image to be inspected is preferably converted (33) to the conventional TV resolution of the (MPEG2-compressed) contents being played back on the computer's DVD drive. In graphic cards providing multiple outputs (VGA, TV, DVI), the same watermark detector may be time-sequentiall connected (34) to each of the outputs.

Claims (10)

1. A method of detecting a watermark in a multimedia signal being rendered by a computer system for display on a display screen connectable to said computer system, the method comprising the steps of:
receiving the multimedia signal in the form of color signal components (R,G,B);
converting said color signal components into a luminance signal (Y),
detecting the watermark in said luminance signal.
2. A method as claimed in claim 1, wherein said step of converting comprises computing Y=R/4+G/2+B/8, where Y is said luminance signal and R, G and B are said color signal components.
3. A method as claimed in claim 2, in which the step of watermark detection includes:
dividing a suspect image into areas corresponding to the size of a repeatedly embedded watermark pattern;
accumulating said image areas; and
detecting the watermark pattern in the accumulated image area;
wherein the method comprises:
applying said steps of dividing and accumulating to each of said color signal components;
applying the step of converting to the accumulated image areas to obtain an accumulated image area in luminance signal domain; and
applying said step of detecting the watermark to the accumulated image area in the luminance signal domain.
4. A method as claimed in claim 1, wherein said color signal components are red, green and blue, and said step of converting comprises selecting the green color signal component to constitute said luminance signal.
5. A method as claimed in claim 1, wherein the step of detecting the watermark comprises using a watermark detector being arranged to detect the watermark in a luminance signal having a predetermined resolution, the method further comprising the step of changing the resolution of the multimedia signal to said predetermined resolution prior to said watermark detection.
6. A method of detecting a watermark in a multimedia signal being rendered by a computer system through a plurality of outputs each connectable to a display screen, characterized in that the method comprises the step of time-sequentially connecting a watermark detector operating according to claim 1.
7. A computer system for rendering a multimedia signal method for display on a display screen via a display output of said computer system, the computer system comprising a watermark detector connected to said display output, said watermark detector being arranged to:
receive the rendered multimedia signal in the form of color signal components (R,G,B);
convert said color signal components into a luminance signal (Y),
detect the watermark in said luminance signal.
8. A computer system as claimed in claim 7, the computer system comprising a plurality of said display outputs each connectable to a display screen, characterized in that the computer system further includes means for time-sequentially connecting said watermark detector to one of said plurality of outputs.
9. A graphics card for displaying a multimedia signal rendered by a computer system on a display screen via a display output of said graphics card, the graphics card comprising a watermark detector connected to said display output, said watermark detector being arranged to:
receive the rendered multimedia signal in the form of color signal components (R,G,B);
convert said color signal components into a luminance signal (Y),
detect the watermark in said luminance signal.
10. A graphics card as claimed in claim 9, the graphics card comprising a plurality of said display outputs each connectable to a display screen, characterized in that the graphics card further includes means for time-sequentially connecting said watermark detector to one of said plurality of outputs.
US10/525,489 2002-08-28 2003-08-12 Method and arrangement for watermark detection Abandoned US20060126888A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP02078544 2002-08-28
EP02078544.0 2002-08-28
PCT/IB2003/003650 WO2004021700A1 (en) 2002-08-28 2003-08-12 Method and arrangement for watermark detection

Publications (1)

Publication Number Publication Date
US20060126888A1 true US20060126888A1 (en) 2006-06-15

Family

ID=31970358

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/525,483 Expired - Fee Related US7561715B2 (en) 2002-08-28 2003-08-12 Method and arrangement for watermark detection
US10/525,489 Abandoned US20060126888A1 (en) 2002-08-28 2003-08-12 Method and arrangement for watermark detection

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/525,483 Expired - Fee Related US7561715B2 (en) 2002-08-28 2003-08-12 Method and arrangement for watermark detection

Country Status (7)

Country Link
US (2) US7561715B2 (en)
EP (2) EP1537529A1 (en)
JP (2) JP2005537736A (en)
KR (2) KR20050057016A (en)
CN (2) CN1679322A (en)
AU (2) AU2003253169A1 (en)
WO (2) WO2004021277A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110037850A1 (en) * 2009-08-12 2011-02-17 Utechzone Co., Ltd. Surveillance system for monitoring security personnel
US7895442B1 (en) * 2007-06-18 2011-02-22 Qurio Holdings, Inc. Interconnect device to enable compliance with rights management restrictions
US8000474B1 (en) 2006-12-15 2011-08-16 Quiro Holdings, Inc. Client-side protection of broadcast or multicast content for non-real-time playback
US8135947B1 (en) 2007-03-21 2012-03-13 Qurio Holdings, Inc. Interconnect device to enable compliance with rights management restrictions
US9191605B1 (en) 2007-03-26 2015-11-17 Qurio Holdings, Inc. Remote monitoring of media content that is associated with rights management restrictions

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8667275B2 (en) * 2004-06-03 2014-03-04 Digimarc Corporation Economically secure digital mass media systems
US7370190B2 (en) * 2005-03-03 2008-05-06 Digimarc Corporation Data processing systems and methods with enhanced bios functionality
KR100820827B1 (en) * 2006-05-02 2008-04-10 엘지전자 주식회사 The display device for having the function of detecting a code related to copy protection and method for controlling the same
RU2329522C2 (en) * 2006-06-01 2008-07-20 Самсунг Электроникс Ко., Лтд. Adaptive embedding of water marks through several channels
DE102010036290A1 (en) * 2010-08-27 2012-03-01 Siemens Aktiengesellschaft Device for graphical visualization of system states
CN102685076A (en) * 2011-03-16 2012-09-19 中国电信股份有限公司 Online information protection method and device
CN106412720B (en) * 2015-07-27 2020-06-16 腾讯科技(深圳)有限公司 Method and device for removing video watermark
US10395013B2 (en) 2016-05-11 2019-08-27 Stmicroelectronics Sa Method and device for enhancing the protection of a signal, in particular a multimedia signal, against a malicious attack
FR3052009B1 (en) 2016-05-31 2018-06-01 Stmicroelectronics Sa METHOD AND DEVICE FOR ENHANCING THE PROTECTION OF A MULTIMEDIA SIGNAL AGAINST MALICIOUS ATTACK.

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5784050A (en) * 1995-11-28 1998-07-21 Cirrus Logic, Inc. System and method for converting video data between the RGB and YUV color spaces
US20020012432A1 (en) * 1999-03-27 2002-01-31 Microsoft Corporation Secure video card in computing device having digital rights management (DRM) system
US6614914B1 (en) * 1995-05-08 2003-09-02 Digimarc Corporation Watermark embedder and reader
US6714683B1 (en) * 2000-08-24 2004-03-30 Digimarc Corporation Wavelet based feature modulation watermarks and related applications
US6751320B2 (en) * 1996-04-25 2004-06-15 Digimarc Corporation Method and system for preventing reproduction of professional photographs
US7142689B2 (en) * 2000-01-31 2006-11-28 Canon Kabushiki Kaisha Image processing apparatus for determining specific images

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US462836A (en) * 1891-11-10 Mechanical cut-out
JPS4812379B1 (en) * 1968-12-16 1973-04-20
US4628362A (en) * 1985-05-02 1986-12-09 American Dynamics Corporation Combined video AGC and digitizing circuit
US6516079B1 (en) * 2000-02-14 2003-02-04 Digimarc Corporation Digital watermark screening and detecting strategies
US6411725B1 (en) * 1995-07-27 2002-06-25 Digimarc Corporation Watermark enabled video objects
EP0901282B1 (en) * 1997-09-03 2006-06-28 Hitachi, Ltd. Method for recording and reproducing electronic watermark information
SG70120A1 (en) * 1997-09-17 2000-01-25 Hitachi Ltd Recording/reproducing method and apparatus processing apparatus and recording medium for video signal having copy control information
US6829301B1 (en) * 1998-01-16 2004-12-07 Sarnoff Corporation Enhanced MPEG information distribution apparatus and method
KR100362801B1 (en) * 1998-05-20 2002-11-29 매크로비젼 코포레이션 Method and apparatus for watermark detection for specific scales and arbitrary shifts
US6553127B1 (en) * 1998-05-20 2003-04-22 Macrovision Corporation Method and apparatus for selective block processing
JP4069339B2 (en) * 1998-10-16 2008-04-02 ソニー株式会社 Signal conversion apparatus and signal conversion method
JP3881794B2 (en) * 1998-10-27 2007-02-14 興和株式会社 Digital watermark embedding method and decoding method thereof
JP3942759B2 (en) * 1999-01-25 2007-07-11 興和株式会社 Digital watermark embedding method, decoding method and apparatus
US7013021B2 (en) * 1999-03-19 2006-03-14 Digimarc Corporation Watermark detection utilizing regions with higher probability of success
US7203310B2 (en) * 2001-12-04 2007-04-10 Microsoft Corporation Methods and systems for cryptographically protecting secure content
WO2003063067A1 (en) * 2002-01-24 2003-07-31 Chatterbox Systems, Inc. Method and system for locating positions in printed texts and delivering multimedia information

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6614914B1 (en) * 1995-05-08 2003-09-02 Digimarc Corporation Watermark embedder and reader
US5784050A (en) * 1995-11-28 1998-07-21 Cirrus Logic, Inc. System and method for converting video data between the RGB and YUV color spaces
US6751320B2 (en) * 1996-04-25 2004-06-15 Digimarc Corporation Method and system for preventing reproduction of professional photographs
US20020012432A1 (en) * 1999-03-27 2002-01-31 Microsoft Corporation Secure video card in computing device having digital rights management (DRM) system
US7142689B2 (en) * 2000-01-31 2006-11-28 Canon Kabushiki Kaisha Image processing apparatus for determining specific images
US6714683B1 (en) * 2000-08-24 2004-03-30 Digimarc Corporation Wavelet based feature modulation watermarks and related applications

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8000474B1 (en) 2006-12-15 2011-08-16 Quiro Holdings, Inc. Client-side protection of broadcast or multicast content for non-real-time playback
US8135947B1 (en) 2007-03-21 2012-03-13 Qurio Holdings, Inc. Interconnect device to enable compliance with rights management restrictions
US8850183B1 (en) 2007-03-21 2014-09-30 Qurio Holdings, Inc. Interconnect device to enable compliance with rights management restrictions
US9191605B1 (en) 2007-03-26 2015-11-17 Qurio Holdings, Inc. Remote monitoring of media content that is associated with rights management restrictions
US7895442B1 (en) * 2007-06-18 2011-02-22 Qurio Holdings, Inc. Interconnect device to enable compliance with rights management restrictions
US20110145935A1 (en) * 2007-06-18 2011-06-16 Qurio Holdings, Inc. Interconnect device to enable compliance with rights management restrictions
US8245046B2 (en) 2007-06-18 2012-08-14 Qurio Holdings, Inc. Interconnect device to enable compliance with rights management restrictions
US20110037850A1 (en) * 2009-08-12 2011-02-17 Utechzone Co., Ltd. Surveillance system for monitoring security personnel

Also Published As

Publication number Publication date
JP2005537736A (en) 2005-12-08
KR20050057076A (en) 2005-06-16
CN1679050A (en) 2005-10-05
KR20050057016A (en) 2005-06-16
CN1679322A (en) 2005-10-05
US7561715B2 (en) 2009-07-14
JP2005537737A (en) 2005-12-08
EP1537735A1 (en) 2005-06-08
AU2003253184A1 (en) 2004-03-19
WO2004021700A1 (en) 2004-03-11
WO2004021277A1 (en) 2004-03-11
US20060126887A1 (en) 2006-06-15
AU2003253169A1 (en) 2004-03-19
EP1537529A1 (en) 2005-06-08

Similar Documents

Publication Publication Date Title
US7561715B2 (en) Method and arrangement for watermark detection
EP1582962B1 (en) System and method for protecting media content
US6272283B1 (en) Copy-protection for laptop PC by disabling TV-out while viewing protected video on PC display
US7580526B2 (en) Methods and apparatus for protecting signals transmitted between a source and destination device over multiple signals lines
US8510654B2 (en) Techniques for shuffling video information
US20070050294A1 (en) System and method for preventing disk cloning in set-top boxes
JPH11196386A (en) Computer system and closed caption display method
US20070053662A1 (en) Playback apparatus and playback method
US20090034936A1 (en) Copy protection for analog video signals from computing devices
JP4849885B2 (en) Video encoding apparatus, video encoding method, and electronic apparatus using the same
EP2745234B1 (en) Securing a hdcp link from graphic processor gpu to video display.
US6606450B1 (en) Method and apparatus for processing video signals having associated access restriction data
JPH10143437A (en) Computer system and animation transfer method
US6490686B1 (en) Method and apparatus for restricting privilege access to distributed content information
US7917442B2 (en) System and method for relaxing media access restrictions over time
JP2007068111A (en) Dynamic image reproducing apparatus, dynamic image reproducing method and dynamic image reproducing program
KR101029707B1 (en) Method and apparatus for preventing recording of image data by using hdmi card
US20070124823A1 (en) Video image reproducing apparatus and method of managing specified information of reproducing apparatus
JP2000069415A (en) Image control circuit, image control method or medium that enables to be read by computer in which program to make computer system execute image control method is stored
KR20000035454A (en) Method and apparatus for embedding a watermark in video signals
JPH11252498A (en) Copy protection method and device of high image quality digital video data thereof
US7454018B1 (en) Transfer of DVD decode key on a window by window basis to an attached device
KR100658398B1 (en) Apparatus and inspection method for signal distribution in digital media source
CN112911187A (en) System and method for judging video data tampering
JP2002232696A (en) Method and device for embedding digital watermark information and method and device for reproducing digital watermark information

Legal Events

Date Code Title Description
AS Assignment

Owner name: KONINKLIJKE PHILIPS ELECTRONICS, N.V., NETHERLANDS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:TALSTRA, JOHAN CORNELIS;OOSTVEEN, JOB CORNELIS;LANGELAAR, GERRIT CORNELIS;AND OTHERS;REEL/FRAME:017323/0220;SIGNING DATES FROM 20040325 TO 20040329

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION