WO1995020291A1 - Method of and apparatus for manipulating digital data works - Google Patents

Method of and apparatus for manipulating digital data works Download PDF

Info

Publication number
WO1995020291A1
WO1995020291A1 PCT/GB1995/000099 GB9500099W WO9520291A1 WO 1995020291 A1 WO1995020291 A1 WO 1995020291A1 GB 9500099 W GB9500099 W GB 9500099W WO 9520291 A1 WO9520291 A1 WO 9520291A1
Authority
WO
WIPO (PCT)
Prior art keywords
work
data
digital data
elements
target
Prior art date
Application number
PCT/GB1995/000099
Other languages
French (fr)
Inventor
Otso Paatelma
Rod Hugh Borland
Original Assignee
Highwater Fbi Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Highwater Fbi Limited filed Critical Highwater Fbi Limited
Priority to AU14228/95A priority Critical patent/AU1422895A/en
Publication of WO1995020291A1 publication Critical patent/WO1995020291A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32203Spatial or amplitude domain methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32203Spatial or amplitude domain methods
    • H04N1/32224Replacing pixels of an image with other pixels from the same image, e.g. texture block coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32203Spatial or amplitude domain methods
    • H04N1/32251Spatial or amplitude domain methods in multilevel data, e.g. greyscale or continuous tone data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32309Methods relating to embedding, encoding, decoding, detection or retrieval operations in colour image data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3269Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
    • H04N2201/327Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs which are undetectable to the naked eye, e.g. embedded codes

Definitions

  • This invention relates to a method of and apparatus for manipulating digital data works, particularly to provide, or embed within, such digital data works, data information descriptive of the work, for example, the source of the work, its ownership and its availability for legal reproduction without infringement of copyright.
  • the present invention is not directed to manipulating small units of digital data to enable that data to carry information inherent to the proper comprehension of the digital data itself but instead to hiding within a digital data work inrormation that is specifically descriptive of that particular digital data work.
  • digital data work defines any sequence of digital data capable of constituting a work in which copyright might subsist or the unauthorised reproduction of which might constitute infringement of copyright subsisting in the work or a larger work of which the work itself forms a part.
  • the digital data defining the output from scanning a 35mm colour transparency would be a digital data work.
  • a professional photographer uses a digital camera to take a digital photograph. He may wish to place the data file which constitutes the digital data work (the digitised photograph) with a photograph library. When the photograph is subsequently used, the photographer will be paid a copyright licence fee.
  • the ease with which the data file can be duplicated without any loss of information means that the fu ⁇ her use of the image can be impossible to control. In practice, there is a high probability that the image could be published again without the photographer being alerted to the fact: the photographer losses out on licence fees.
  • the ease with which digital images can be cropped and modified compounds the problem.
  • a method of manipulating a digital data work comprises the steps of:- analysing the digital data work for the occurrence of a particular pattern or sequence of data elements in the work, such a pattern or sequence being indicative of the location of a target data element in the work: and modifying characteristics of the target data element in the work in accordance with a predetermined rule, to generate the additional data, the presence of the additional data not being readily apparent or detectable in the digital data work after manipulation.
  • the additional data which is descriptive of the digital data work can be hidden within the digital data work in a manner that is not readily detectable and therefore does not discernibly alter the digital data work.
  • Being able to hide such data within a work clearly also has attractions to the non-commercial user as well; for example, many cameras today have the facility to imp ⁇ nt a date on an image. This has the disadvantage of defacing the image.
  • the present invention implemented into a digital camera, the photographer can hide not only date information but other data too into each digital image with no appreciable affect to the image itself.
  • a pa ⁇ icular pattern or sequence of data in the digital data work in effect surrounds a candidate or target data element: the location of the manipulated target data elements is therefore apparent if one knows what particular pattern or sequence of data in the digital data work, or portions of that work, to look for.
  • the mere presence of manipulated target data elements constitutes the additional data; i.e. there is no textual information per se hidden within the digital data work.
  • the presence of target data elements manipulated in accordance with a predetermined rule acts as a indicator that the work is. for example, a copyright work which cannot be reproduced without specific permission from the right holder. This can be likened to giving the digital data work a 'fingerprint ' .
  • the actual data content of the manipulated target data elements may code for pa ⁇ icular textual information pe ⁇ aining to the copyright status of the work.
  • a copyright notice that would be hidden to persons, for example, viewing a digitised image can be detected if one knows the particular pattern or sequence of data which is the signpost to a data modification as defined above.
  • a digital data work is both 'fingerprinted' and comprises 'encrypted' text.
  • the pa ⁇ icular pattern or sequence may exist as a sequence in time, for example where the digital data work is an audio work. In addition, it may occur as a pattern of locations that are defined by their spatial relationships to one another. This may arise where the digital data work is an image.
  • the pattern may also exist as a combination of temporal and spatial sequences or patterns, for example where the digital data work is an audio-visual work.
  • the elements may be the discrete or basic units of digital information and the characteristics may be the values of those units of digital information. For example, where the digital data work is an audio work, the characteristics may be the values of the quantised amplitude levels associated with each successive time period. If the digital data work is a digital image, then the elements may be the pixels and the characteristics may be the pixel values.
  • the elements need not from part of a continuous sequence, nor occur on the same row. In some circumstances, it may be preferable to have a complex algorithm to determine the location, in either time or space, of the elements that may form into the required pattern. This may be pa ⁇ icularly useful where there is a need to conceal the required pattern in order to prevent the system being cracked.
  • the pa ⁇ icular pattern or sequence chosen will be selected because it usually occurs many thousands of times in a typical digital data work, so that there is considerable repetition and therefore redundancy in manipulations.
  • the pattern may be the presence of a given number of pixel values which are each different from their spatially adjacent neighbours along a given row; the value of the subsequent pixel along the row may then be replaced with the value of the next pixel value along the row.
  • many manipulations would be carried out for a typical digital image, so that even severe distortions or selections from this image will still result in many sets of additional data within the resulting, manipulated digital data work.
  • each element may be a set of pixels rather than a single pixel.
  • the characteristics can be the colour temperature of the set of pixels, the average red value of the set, or any other value attributable to the set.
  • the pa ⁇ icular pattern can then be one associated with different sets of pixels. For example, it could be based on sets of four pixels: the pattern could be a sequence of five series of such four pixel sets in which the red average value for each four pixel set increases by more than. say. 10 units, from set to set.
  • the next set of four pixels could be the candidate or target set to be manipulated. The actual manipulation could be the adjustment of the red average value of that next set to be equal to that of the last of the four pixels.
  • the digital data work is an image and comprises elements each of which defines a pixel.
  • the pa ⁇ icular pattern is the presence, firstly, of a given number of elements having pixel values, i.e. characteristics, which are each different from their adjacent neighbours and which determine the position of a target element and secondly, the presence, su ⁇ ounding the target element, of n elements, each having pixel values that are all different from one another, each representing an n-based number.
  • the predetermined rule is then that if the target element is to code for the number m, falling within the range 0 - [n- 1 ], then it is given a pixel value equal to that occurring at the su ⁇ ounding element associated with the n-based number equal to rn.
  • the predetermined rule may include a sub-rule that specifies that no modification shall occur if the original and modified elements would differ by more than a defined tolerance. This ensure that the manipulation of the digital data work does not alter the image beyond tolerance limits, hence ensuring that the manipulation is not readily discernible.
  • a method of reading a digital data work comprising the steps of analysing the digital data work for a particular pattern or sequence of data and determining if elements of the work have been replaced in dependence on the occurrence of the pa ⁇ icular pattern of data and in accordance with a predetermined rule.
  • apparatus for manipulating a digital data work to include additional data operable to perform the methods described above.
  • Figure 1 depicts in schematic form the layout of pixels that may be coded for in one aspect of the invention, to be refe ⁇ ed to as "fingerprinting";
  • Figure 2 depicts in schematic form the layout of pixels that may be coded for in another aspect of the invention, to be referred to as " encrypting”.
  • a 4-bit image can comprise pixels with 16 different colours, an 8-bit image 256 and a 24-bit image 16,777,216 different colours.
  • colours are represented by the three colours red, green and blue. Any colour can be generated by mixing the relative amounts of each of these colours for any given pixel.
  • the most convincing representation requires a 24-bit image, where each sub-colour would have a one byte (8 bit) value.
  • 'palette' is typically an array of 256 3-byte RGB values, defined individually for each image.
  • the matrix of dots, or bitmap, that forms the entire image does not have to be a 24-bit image but instead just an 8-bit image, where the 8-bit pixel values are pointers to the palette of 24-bit colour values.
  • the present embodiment is implemented in an apparatus, referred to as DIP (Digital Image Protection) which [1] alters digital bit-mapped images by selectively modifying the pixels in the image and [2] scans images for previously performed modifications.
  • DIP Digital Image Protection
  • One purpose of DIP is to hide text information in the image in such a way that the legal owner of the copyright in the image can prove his/her ownership of the image even after severe modifications of the image. This process is referred to as 'encryption'. Additionally, it allows the image to be modified in such a way that third parties can search for non-textual modifications, the presence of which indicates that reproduction of the image would infringe copyright. This can be thought of as giving a 'fingerprint' to the image. Both the 'fingerprint' and 'encrypted' information is camouflaged in the picture so that the human eye cannot spot the difference between a manipulated image and the original image when they are placed beside each other.
  • the DIP system operates as follows. Firstly, the bit mapped image is read into an internal buffer in a separate analysis module, hence allowing the image to be of any possible format.
  • the DIP system cu ⁇ ently produced assumes that the image has a palette look-up table for colours, but with slight modifications (which would be within the expe ⁇ ise of the skilled implementer) it can work with non-palette images.
  • the module determines the run-time parameter, and depending on the task, either modifies the image by encrypting or fingerprinting it, or searches the image data for previously planted fingerprints/encrypted characters.
  • a pixel will qualify as a target pixel for a fingerprint if it is preceded by a given number of consecutive pixels along a row which are each different to their immediate neighbours.
  • the value of the pixel a pre-set number of pixels after the target pixel is then determined, and in the case of fingerprinting, the target pixel is given this new value as a replacement for its original value.
  • the replacement does not, however, take place if the target pixel needs to be modified by an amount in excess of a given tolerance.
  • the colour difference is checked with all colours, i.e. red, green and blue, individually.
  • the DIP system searches for fingerprints, it looks for target pixels that satisfy the above relation, i.e. are pixels that are preceded by a given number of different pixels; if the target pixel's value equals that of the next pixel along the row, a 'found' counter is incremented by one. At the end of the search procedure, a percentage figure of 'found' pixels out of all target pixels is calculated. DIP then displays this figure so that an operator can assess whether or not the image had been fingerprinted.
  • a pixel [x] in the image is to be modified when [a] previous pixels (l....a) have different values compared to each other.
  • the pixel's value is a candidate to be changed to a value equal to that of the pixel [b] pixels away from the target pixel, i.e. pixel [x +b].
  • the encryption of alpha-numeric characters also sta ⁇ s from a target pixel, i.e. one for which a given number of consecutive preceding pixels are each different to their neighbours.
  • An additional condition is also checked: it is whether or not a particular array of four su ⁇ ounding pixels all have a different value to each other. If this condition is fulfilled, the candidate pixel will swap its value with one of the four pixels around it, so long as the colour tolerance allows it, i.e. the change is within a defined tolerance. Hence the target pixel will code for a four-based number. These numbers are then fed to a six-digit array. The first three digits are the actual figures, with a value ranging from 0 to 63 [63 being 4-3 -1].
  • the next number will be a checksum, or parity and the last two are end of character indicators, or stop bits.
  • a figure 32 is added to the resulting figure so the result can be an ASCII character between 32 [space] and 95 [underscore]. This includes all uppercase English letters, numbers and most common punctuation marks. In this way, successive encrypted pixels can define any alpha ⁇ numeric character.
  • DIP conve ⁇ s the ASCII characters of the message to four based numbers one by one; the checksum, or parity number and the end-of character indicators, or stopbits, are then added to these figures.
  • Messages can include copyright notices, or code numbers that are recorded on a central database against legal owners etc. of the image.
  • a third pa ⁇ y wanting to reproduce the image need only use the DIP system to extract the relevant code number and then communicate it to the central database controller, who in turn will inform the third pa ⁇ y of the relevant person to whom royalties need be paid.
  • the problem of researching who owns an image which can be verv labour intensive, is entirely obviated.
  • DIP typically fingerprints lines 0, 2, 4, .... and encrypts lines 1, 3, 5 ... of the image. When searching for the fingerprints, it scans all the lines and determines, depending on the quantity of found fingerprints, if the encryption codes should be looked for in the odd or even lines.
  • the encrypted characters if found, are printed on the screen of the DIP.
  • the program analyses the probability for the image having been fingerprinted earlier by DIP. the analysis being based on the percentage of 'found' pixels, and prints a verbal message as a result.
  • the encryption concept uses fingerprinting with Additional Condition Verifying (ACV) to store a fragment of an [n] based number at that location.
  • ACV condition is true when [n] pixels near the location are all different, hence enabling the pixel at the location to be uniquely modified to reflect one of the pixels around/near it.
  • An example of such conditions follows.
  • a pixel [x] in the image is to be modified when [a] pixels (l...a) have different values compared to each other and [n] su ⁇ ounding pixels (PI Pn) have different values to each other.
  • the new value of the pixel [x] will be one of the pixels Pl....Pn, hence identifying an n- based number (0 n-1).
  • target pixel [x] is given the value of pixel PI. If the number to be stored is 1, then it is changed to the value of pixel P2, and so on. This change will obey the same PC limitations as described earlier.

Abstract

A method of hiding copyright related messages within digital data works is taught. The method relies on commonly occurring patterns or sequences of data elements in the work acting as signpost to target data elements which are modified according to certain rules; the presence of the modification indicates that the work is a copyright work; the actual nature of the modification can code for textual information, enabling more detailed information, e.g. the name of the copyright holder, to be hidden within the work.

Description

Method of and apparatus for manipulating digital data works
Field of the invenπon
This invention relates to a method of and apparatus for manipulating digital data works, particularly to provide, or embed within, such digital data works, data information descriptive of the work, for example, the source of the work, its ownership and its availability for legal reproduction without infringement of copyright.
Description of the Prior An
Systems based upon digital data are becoming universal and indispensable; digital data passing between computers: digital telecommunications: digital audio; digital cameras; and the convergence of many of these individual components into multi-media, are a selection of the technologies to which this invention relates. The data structures or formats that are used in these different technologies are well documented and will not be described in this specification. It will however be appreciated by the skilled implementer that sophisticated encoding and compression algorithms are commonly used in digital recording and transmission and that these techniques may involve the manipulation of raw digital data in order for that data to carry further information. However, the further information introduced in such known techniques provides data needed to understand or handle, for example, bytes of the raw data properly. The present invention is not directed to manipulating small units of digital data to enable that data to carry information inherent to the proper comprehension of the digital data itself but instead to hiding within a digital data work inrormation that is specifically descriptive of that particular digital data work. The term digital data work defines any sequence of digital data capable of constituting a work in which copyright might subsist or the unauthorised reproduction of which might constitute infringement of copyright subsisting in the work or a larger work of which the work itself forms a part. Hence, for example, the digital data defining the output from scanning a 35mm colour transparency would be a digital data work.
There is a pressing need to enable the ownership of a digital data work to be readily apparent from the work itself. This would allow the owner of the copyright in the data to prove more readily its ownership and thereby prevent further unlawful reproduction or negotiate a licence fee for use of the work. Also, it would enable a publisher of digital data works, for example a company that compiles multi-media CD-ROMS, to ensure that it is not unwittingly infringing copyright. Conventionally, this requires laborious and meticulous manual recording of the provenance of third parry digital data works that are to be used. This is time consuming, expensive and not wholly reliable.
As a more specific example, a professional photographer uses a digital camera to take a digital photograph. He may wish to place the data file which constitutes the digital data work (the digitised photograph) with a photograph library. When the photograph is subsequently used, the photographer will be paid a copyright licence fee. However, the ease with which the data file can be duplicated without any loss of information means that the fuπher use of the image can be impossible to control. In practice, there is a high probability that the image could be published again without the photographer being alerted to the fact: the photographer losses out on licence fees. The ease with which digital images can be cropped and modified compounds the problem.
Currently, it is possible to include a simple identifier in the header of the data file of a digital data work. The header could typically comprise a simple copyright notice. However, it is very easy to strip out this information, making this approach unreliable. Fuπher, translating a file into a different format also results in this information being lost.
Statement of the invention
In accordance with the present invention, a method of manipulating a digital data work, made up of a number of data elements, to include additional data descriptive of that digital data work, comprises the steps of:- analysing the digital data work for the occurrence of a particular pattern or sequence of data elements in the work, such a pattern or sequence being indicative of the location of a target data element in the work: and modifying characteristics of the target data element in the work in accordance with a predetermined rule, to generate the additional data, the presence of the additional data not being readily apparent or detectable in the digital data work after manipulation.
In this way. the additional data which is descriptive of the digital data work, typically a copyright notice or more detailed historical information broadly peπaining to the copyright in the digital data work (for example, date of creation, identity of creator etc), can be hidden within the digital data work in a manner that is not readily detectable and therefore does not discernibly alter the digital data work. Being able to hide such data within a work clearly also has attractions to the non-commercial user as well; for example, many cameras today have the facility to impπnt a date on an image. This has the disadvantage of defacing the image. With the present invention implemented into a digital camera, the photographer can hide not only date information but other data too into each digital image with no appreciable affect to the image itself. Typically, a paπicular pattern or sequence of data in the digital data work in effect surrounds a candidate or target data element: the location of the manipulated target data elements is therefore apparent if one knows what particular pattern or sequence of data in the digital data work, or portions of that work, to look for. In a simpler variant, the mere presence of manipulated target data elements constitutes the additional data; i.e. there is no textual information per se hidden within the digital data work. Instead, the presence of target data elements manipulated in accordance with a predetermined rule acts as a indicator that the work is. for example, a copyright work which cannot be reproduced without specific permission from the right holder. This can be likened to giving the digital data work a 'fingerprint'.
In more complex variants, the actual data content of the manipulated target data elements may code for paπicular textual information peπaining to the copyright status of the work. In this way. a copyright notice that would be hidden to persons, for example, viewing a digitised image, can be detected if one knows the particular pattern or sequence of data which is the signpost to a data modification as defined above. Hence, such a digital data work is both 'fingerprinted' and comprises 'encrypted' text.
The paπicular pattern or sequence may exist as a sequence in time, for example where the digital data work is an audio work. In addition, it may occur as a pattern of locations that are defined by their spatial relationships to one another. This may arise where the digital data work is an image. The pattern may also exist as a combination of temporal and spatial sequences or patterns, for example where the digital data work is an audio-visual work. The elements may be the discrete or basic units of digital information and the characteristics may be the values of those units of digital information. For example, where the digital data work is an audio work, the characteristics may be the values of the quantised amplitude levels associated with each successive time period. If the digital data work is a digital image, then the elements may be the pixels and the characteristics may be the pixel values. The elements need not from part of a continuous sequence, nor occur on the same row. In some circumstances, it may be preferable to have a complex algorithm to determine the location, in either time or space, of the elements that may form into the required pattern. This may be paπicularly useful where there is a need to conceal the required pattern in order to prevent the system being cracked.
Generally, the paπicular pattern or sequence chosen will be selected because it usually occurs many thousands of times in a typical digital data work, so that there is considerable repetition and therefore redundancy in manipulations. For example, in the context of digital imagery, the pattern may be the presence of a given number of pixel values which are each different from their spatially adjacent neighbours along a given row; the value of the subsequent pixel along the row may then be replaced with the value of the next pixel value along the row. In this way, many manipulations would be carried out for a typical digital image, so that even severe distortions or selections from this image will still result in many sets of additional data within the resulting, manipulated digital data work.
Careful selection of the paπicular pattern is required to resist some compression techniques. For example, it may be preferable for each element to be a set of pixels rather than a single pixel. Then, the characteristics can be the colour temperature of the set of pixels, the average red value of the set, or any other value attributable to the set. The paπicular pattern can then be one associated with different sets of pixels. For example, it could be based on sets of four pixels: the pattern could be a sequence of five series of such four pixel sets in which the red average value for each four pixel set increases by more than. say. 10 units, from set to set The next set of four pixels could be the candidate or target set to be manipulated. The actual manipulation could be the adjustment of the red average value of that next set to be equal to that of the last of the four pixels.
Since the additional data associated with the manipulate d elements may represent numbers or letters, text messages can be buried within the manipulated digital data work. In this way, a digital data work can carry in parallel two or more sets of data, one of which is concealed from normal usage of the digital data work.
In one embodiment of this aspect, the digital data work is an image and comprises elements each of which defines a pixel. The paπicular pattern is the presence, firstly, of a given number of elements having pixel values, i.e. characteristics, which are each different from their adjacent neighbours and which determine the position of a target element and secondly, the presence, suπounding the target element, of n elements, each having pixel values that are all different from one another, each representing an n-based number. The predetermined rule is then that if the target element is to code for the number m, falling within the range 0 - [n- 1 ], then it is given a pixel value equal to that occurring at the suπounding element associated with the n-based number equal to rn.
In either aspect, the predetermined rule may include a sub-rule that specifies that no modification shall occur if the original and modified elements would differ by more than a defined tolerance. This ensure that the manipulation of the digital data work does not alter the image beyond tolerance limits, hence ensuring that the manipulation is not readily discernible.
In a yet fuπher aspect of the present invention, there is provided a method of reading a digital data work comprising the steps of analysing the digital data work for a particular pattern or sequence of data and determining if elements of the work have been replaced in dependence on the occurrence of the paπicular pattern of data and in accordance with a predetermined rule.
In addition, there is provided apparatus for manipulating a digital data work to include additional data, operable to perform the methods described above.
Brief Description of the Drawings
The invention will now be described with reference to the accompanying drawings, in which:-
Figure 1 depicts in schematic form the layout of pixels that may be coded for in one aspect of the invention, to be refeπed to as "fingerprinting";
Figure 2 depicts in schematic form the layout of pixels that may be coded for in another aspect of the invention, to be referred to as "encrypting". Detailed Description
The detailed description that follows is in respect of an embodiment of the invention that relates to manipulating the digital data of a colour bit-mapped digital image.
The technology of colour bit-mapped imagery is well known and will not be described in detail. For the present purposes, it will suffice to observe that a 4-bit image can comprise pixels with 16 different colours, an 8-bit image 256 and a 24-bit image 16,777,216 different colours. On a computer display, colours are represented by the three colours red, green and blue. Any colour can be generated by mixing the relative amounts of each of these colours for any given pixel. The most convincing representation requires a 24-bit image, where each sub-colour would have a one byte (8 bit) value. However, due to computer hardware speed and price constraints, an alternative system called 'palette' has been developed. A 'palette' is typically an array of 256 3-byte RGB values, defined individually for each image. Using the palette system, the matrix of dots, or bitmap, that forms the entire image does not have to be a 24-bit image but instead just an 8-bit image, where the 8-bit pixel values are pointers to the palette of 24-bit colour values.
The present embodiment is implemented in an apparatus, referred to as DIP (Digital Image Protection) which [1] alters digital bit-mapped images by selectively modifying the pixels in the image and [2] scans images for previously performed modifications. One purpose of DIP is to hide text information in the image in such a way that the legal owner of the copyright in the image can prove his/her ownership of the image even after severe modifications of the image. This process is referred to as 'encryption'. Additionally, it allows the image to be modified in such a way that third parties can search for non-textual modifications, the presence of which indicates that reproduction of the image would infringe copyright. This can be thought of as giving a 'fingerprint' to the image. Both the 'fingerprint' and 'encrypted' information is camouflaged in the picture so that the human eye cannot spot the difference between a manipulated image and the original image when they are placed beside each other.
The DIP system operates as follows. Firstly, the bit mapped image is read into an internal buffer in a separate analysis module, hence allowing the image to be of any possible format. The DIP system cuπently produced assumes that the image has a palette look-up table for colours, but with slight modifications (which would be within the expeπise of the skilled implementer) it can work with non-palette images. The module than determines the run-time parameter, and depending on the task, either modifies the image by encrypting or fingerprinting it, or searches the image data for previously planted fingerprints/encrypted characters.
Fingerprinting
A pixel will qualify as a target pixel for a fingerprint if it is preceded by a given number of consecutive pixels along a row which are each different to their immediate neighbours. The value of the pixel a pre-set number of pixels after the target pixel is then determined, and in the case of fingerprinting, the target pixel is given this new value as a replacement for its original value. The replacement does not, however, take place if the target pixel needs to be modified by an amount in excess of a given tolerance. The colour difference is checked with all colours, i.e. red, green and blue, individually.
When the DIP system searches for fingerprints, it looks for target pixels that satisfy the above relation, i.e. are pixels that are preceded by a given number of different pixels; if the target pixel's value equals that of the next pixel along the row, a 'found' counter is incremented by one. At the end of the search procedure, a percentage figure of 'found' pixels out of all target pixels is calculated. DIP then displays this figure so that an operator can assess whether or not the image had been fingerprinted.
Referring to figure 1, a pixel [x] in the image is to be modified when [a] previous pixels (l....a) have different values compared to each other. In such a case, the pixel's value is a candidate to be changed to a value equal to that of the pixel [b] pixels away from the target pixel, i.e. pixel [x +b].
To secure the integrity of an image an additional Purity Check ["PC"] is performed when a pixel modification is about to take place. The DIP computer checks the colour [RGB] value difference between the original pixel and the pixel that is proposed for its place. If the value is greater than a defined tolerance, the original pixel is not altered.
Fingerprint Verification
An identical algorithm is used to check an image for previously planted fingerprints. The target pixel's [x] value is verified with the possible replacement pixel's [x + b] value. If the values match, it is likely that pixel is fingerprinted. After collecting a large amount of targets the probability of random matching reduces. In a scanned photographic image, the amount of random matches in non-fingerprinted images is usually between 10% and 20%, whereas in a fingerprinted image the percentage is naturally 100% or very close to that.
Encryption The encryption of alpha-numeric characters also staπs from a target pixel, i.e. one for which a given number of consecutive preceding pixels are each different to their neighbours. An additional condition is also checked: it is whether or not a particular array of four suπounding pixels all have a different value to each other. If this condition is fulfilled, the candidate pixel will swap its value with one of the four pixels around it, so long as the colour tolerance allows it, i.e. the change is within a defined tolerance. Hence the target pixel will code for a four-based number. These numbers are then fed to a six-digit array. The first three digits are the actual figures, with a value ranging from 0 to 63 [63 being 4-3 -1]. The next number will be a checksum, or parity and the last two are end of character indicators, or stop bits. A figure 32 is added to the resulting figure so the result can be an ASCII character between 32 [space] and 95 [underscore]. This includes all uppercase English letters, numbers and most common punctuation marks. In this way, successive encrypted pixels can define any alpha¬ numeric character.
Nery rarely, a candidate or target pixel is found, but the target pixel happens to be the same as one of the four surrounding pixels. DEP will then change the candidate pixel to another value altogether, if the tolerance will allow, so that when decrypting the image DIP will understand that this pixel cannot carry any information.
DIP conveπs the ASCII characters of the message to four based numbers one by one; the checksum, or parity number and the end-of character indicators, or stopbits, are then added to these figures. Messages can include copyright notices, or code numbers that are recorded on a central database against legal owners etc. of the image. In this way, a third paπy wanting to reproduce the image need only use the DIP system to extract the relevant code number and then communicate it to the central database controller, who in turn will inform the third paπy of the relevant person to whom royalties need be paid. In this way, the problem of researching who owns an image, which can be verv labour intensive, is entirely obviated.
Returning to the DIP system. DIP typically fingerprints lines 0, 2, 4, .... and encrypts lines 1, 3, 5 ... of the image. When searching for the fingerprints, it scans all the lines and determines, depending on the quantity of found fingerprints, if the encryption codes should be looked for in the odd or even lines.
The encrypted characters, if found, are printed on the screen of the DIP. On termination, the program analyses the probability for the image having been fingerprinted earlier by DIP. the analysis being based on the percentage of 'found' pixels, and prints a verbal message as a result.
More generally, and referring to figure 2, the encryption concept uses fingerprinting with Additional Condition Verifying (ACV) to store a fragment of an [n] based number at that location. An ACV condition is true when [n] pixels near the location are all different, hence enabling the pixel at the location to be uniquely modified to reflect one of the pixels around/near it. An example of such conditions follows. A pixel [x] in the image is to be modified when [a] pixels (l...a) have different values compared to each other and [n] suπounding pixels (PI Pn) have different values to each other. The new value of the pixel [x] will be one of the pixels Pl....Pn, hence identifying an n- based number (0 n-1). If the number, to be stored at that location is 0, then target pixel [x] is given the value of pixel PI. If the number to be stored is 1, then it is changed to the value of pixel P2, and so on. This change will obey the same PC limitations as described earlier.
By combining these n-based numbers sequentially and organising them in an array, larger figures can be constructed. When writing the numbers into an image, it is useful to construct the aπay of numbers in such a way that it has a built-in checksum and figure-stop indicator trailing each number. This enables DIP to decode information from an image that has been altered.
Decoding of Encrypted Messages An identical algorithm is used to decode an encoded image. When a candidate pixel [x] is found with [n] pixels around it all different, its value is verified from the nearby pixels. The ASCII character associated with the value of the number is found by reversing the process used when encoding.

Claims

Claims
1. A method of manipulating a digital data work, made up of a number of data elements, to include additional data descriptive of that digital data work, comprising the steps of:- analysing the digital data work for the occuπence of a particular pattern or sequence of data elements in the work, such a pattern or sequence being indicative of the location of a target data element in the work: and modifying characteristics of the target data element in the work in accordance with a predetermined rule, to generate the additional data, the presence of the additional data not being readily apparent or detectable in the digital data work after manipulation.
2. The method of Claim 1 where the particular pattern or sequence of data enables the target data elements to be unambiguously identifiable.
3. The method of either Claim 1 or Claim 2 wherein the digital data work is an image and each data element is a pixel or a set of pixels.
4. The method of Claim 3 wherein: the particular pattern is the presence of a given number of data elements having characteristics which are each different from their adjacent neighbours by more than a predetermined amount, the target data element is in a predetermined location with respect to such data elements and the predetermined rule is that the characteristic of the target data element is replaced by the characteristic of a predetermined data element.
5. The method of Claim 1 , 2 or 3 wherein the step of modifying a characteristic of a target data element leads to the presence of additional data that codes for a particular number or letter.
6. The method of Claim 5 wherein the value of the modified target data element has a predetermined relationship to another data element and the location of that other data element with respect to the target data element is indicative of a number or letter.
7. The method of Claim 6 wherein the value of the modified target data element equals that of the other data element and the number of elements separating the target data element from the other element codes for a particular number or letter.
5 8. The method of Claim 6 wherein the digital data work is an image and comprises elements each of which is a pixel or group of pixels and the particular pattern is the presence, firstly, of a given number of elements having values of a variable which are each different from their adjacent neighbours and secondly, the presence, surrounding the target element, of n elements, each having values of that variable that are all 0 different from one another, each representing an n-based number, and wherein the predetermined rule is that if the target element is to code for the number m, falling within the range 0 - [n-1], then it is given a value for its variable equal to that occurring at the surrounding element associated with the n-based number equal to m.
5 9. The method of any preceding Claim wherein the predetermined rule includes a sub-rule that specifies that no modification shall occur if the characteristics of the original and the replaced elements would differ by more than a predetermined amount
10. A method of reading a digital data work to determine if the work has been 0 manipulated in accordance with any preceding Claim 1-9.
11. Apparatus for manipulating a digital data work to include additional data, characterised in being able to perform the method of Claims 1-9.
5 12. Apparatus for reading a digital data work, operable to perform the method of Claim 10 and to display a result indicative of whether the digital data work has been manipulated.
0
--
PCT/GB1995/000099 1994-01-19 1995-01-19 Method of and apparatus for manipulating digital data works WO1995020291A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU14228/95A AU1422895A (en) 1994-01-19 1995-01-19 Method of and apparatus for manipulating digital data works

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB9400971A GB9400971D0 (en) 1994-01-19 1994-01-19 Method of and apparatus for manipulating digital data
GB9400971.9 1994-01-19

Publications (1)

Publication Number Publication Date
WO1995020291A1 true WO1995020291A1 (en) 1995-07-27

Family

ID=10749021

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB1995/000099 WO1995020291A1 (en) 1994-01-19 1995-01-19 Method of and apparatus for manipulating digital data works

Country Status (3)

Country Link
AU (1) AU1422895A (en)
GB (1) GB9400971D0 (en)
WO (1) WO1995020291A1 (en)

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1996027259A1 (en) * 1995-03-02 1996-09-06 Signum Technologies Limited Method of and apparatus for manipulating digital data works
WO1997040619A1 (en) * 1996-04-23 1997-10-30 Charney, Leon, H. Method and system for identifying documents generated by an unauthorized software copy
US5848155A (en) * 1996-09-04 1998-12-08 Nec Research Institute, Inc. Spread spectrum watermark for embedded signalling
EP0884669A2 (en) * 1997-06-13 1998-12-16 Mitsubishi Corporation Digital copyright management system using electronic watermark
EP0901274A2 (en) * 1997-09-03 1999-03-10 Hitachi, Ltd. Method and system for embedding information into contents
US5912972A (en) * 1994-12-14 1999-06-15 Sony Corporation Method and apparatus for embedding authentication information within digital data
US5915027A (en) * 1996-11-05 1999-06-22 Nec Research Institute Digital watermarking
US5930369A (en) * 1995-09-28 1999-07-27 Nec Research Institute, Inc. Secure spread spectrum watermarking for multimedia data
WO2000018109A1 (en) * 1998-09-23 2000-03-30 Koninklijke Philips Electronics N.V. Method for confirming the integrity of an image transmitted with a loss
US6069914A (en) * 1996-09-19 2000-05-30 Nec Research Institute, Inc. Watermarking of image data using MPEG/JPEG coefficients
US6072871A (en) * 1994-10-05 2000-06-06 Leon H. Charney Method and system for identifying the source of documents generated by software and documents generated thereby
US6108434A (en) * 1997-09-12 2000-08-22 Signafy, Inc. Counteracting geometric distortions for DCT based watermarking
US6154571A (en) * 1998-06-24 2000-11-28 Nec Research Institute, Inc. Robust digital watermarking
US6181802B1 (en) 1995-02-06 2001-01-30 Central Research Laboratories Limited Method and apparatus for coding information by inserting codes in strongly featured image regions
US6182218B1 (en) 1994-12-13 2001-01-30 Mitsubishi Corporation Digital content management system using electronic watermark
GB2354857A (en) * 1996-07-02 2001-04-04 Yamaha Corp Storing main information with associated additional information incorporated therein
GB2314949B (en) * 1996-07-02 2001-04-25 Yamaha Corp Method and device for storing main information with associated additional information incorporated therein
US6286036B1 (en) 1995-07-27 2001-09-04 Digimarc Corporation Audio- and graphics-based linking to internet
US6311214B1 (en) 1995-07-27 2001-10-30 Digimarc Corporation Linking of computers based on optical sensing of digital data
US6325420B1 (en) 1998-08-17 2001-12-04 Inspectron Corporation Method for embedding non-intrusive encoded data in printed matter and system for reading same
US6363159B1 (en) 1993-11-18 2002-03-26 Digimarc Corporation Consumer audio appliance responsive to watermark data
US6404781B1 (en) 1997-09-02 2002-06-11 Hitachi, Ltd. Data transmission method for embedded data, data transmitting and reproducing apparatuses and information recording medium therefor
US6430302B2 (en) 1993-11-18 2002-08-06 Digimarc Corporation Steganographically encoding a first image in accordance with a second image
US6434322B1 (en) 1997-09-17 2002-08-13 Hitachi, Ltd. Reproducing method and apparatus, for a video signal having copy control information
US6542620B1 (en) 1993-11-18 2003-04-01 Digimarc Corporation Signal processing to hide plural-bit information in image, video, and audio data
US6560349B1 (en) 1994-10-21 2003-05-06 Digimarc Corporation Audio monitoring using steganographic information
US6584210B1 (en) 1998-03-27 2003-06-24 Hitachi, Ltd. Digital watermark image processing method
US6728408B1 (en) 1997-09-03 2004-04-27 Hitachi, Ltd. Water-mark embedding method and system
US6895556B1 (en) 1999-11-12 2005-05-17 International Business Machines Corporation System and method for providing access to displayed data
US7111170B2 (en) 1999-05-19 2006-09-19 Digimarc Corporation Distributed system for responding to watermarked documents
DE19960769B4 (en) * 1998-12-17 2007-11-15 International Business Machines Corporation Method and system for creating an authenticatable image of an object
EP1968301A2 (en) 1996-05-16 2008-09-10 Digimarc Corporation Computer system linked by using information in data objects
US7522728B1 (en) 1993-11-18 2009-04-21 Digimarc Corporation Wireless methods and devices employing steganography
USRE41657E1 (en) 1994-10-27 2010-09-07 Makoto Saito Data management system
USRE42163E1 (en) 1994-04-01 2011-02-22 Intarsia Software Llc Data management system
US9245260B2 (en) 1994-10-27 2016-01-26 Xylon Llc Data copyright management

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0483936A2 (en) * 1990-10-31 1992-05-06 International Business Machines Corporation Pseudo-bar code control of image transmission
EP0532381A1 (en) * 1991-09-12 1993-03-17 Gemplus Card International Method and apparatus for certifying messages transmitted by a facsimile device
EP0551016A1 (en) * 1992-01-06 1993-07-14 Canon Kabushiki Kaisha Image processing method and apparatus

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0483936A2 (en) * 1990-10-31 1992-05-06 International Business Machines Corporation Pseudo-bar code control of image transmission
EP0532381A1 (en) * 1991-09-12 1993-03-17 Gemplus Card International Method and apparatus for certifying messages transmitted by a facsimile device
EP0551016A1 (en) * 1992-01-06 1993-07-14 Canon Kabushiki Kaisha Image processing method and apparatus

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
KOMATSU N. ET AL: "A PROPOSAL ON DIGITAL WATERMARK IN DOCUMENT IMAGE COMMUNICATION AND ITS APPLICATION TO REALIZING A SIGNATURE", ELECTRONICS AND COMMUNICATIONS IN JAPAN, vol. 73, no. 5, 31 May 1990 (1990-05-31), NEW YORK (US), pages 22 - 33, XP000159282 *

Cited By (71)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6542620B1 (en) 1993-11-18 2003-04-01 Digimarc Corporation Signal processing to hide plural-bit information in image, video, and audio data
US7672477B2 (en) 1993-11-18 2010-03-02 Digimarc Corporation Detecting hidden auxiliary code signals in media
US6587821B1 (en) 1993-11-18 2003-07-01 Digimarc Corp Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith
US8055012B2 (en) 1993-11-18 2011-11-08 Digimarc Corporation Hiding and detecting messages in media signals
US7987094B2 (en) 1993-11-18 2011-07-26 Digimarc Corporation Audio encoding to convey auxiliary information, and decoding of same
US6430302B2 (en) 1993-11-18 2002-08-06 Digimarc Corporation Steganographically encoding a first image in accordance with a second image
US6654480B2 (en) 1993-11-18 2003-11-25 Digimarc Corporation Audio appliance and monitoring device responsive to watermark data
US6363159B1 (en) 1993-11-18 2002-03-26 Digimarc Corporation Consumer audio appliance responsive to watermark data
US6567780B2 (en) 1993-11-18 2003-05-20 Digimarc Corporation Audio with hidden in-band digital data
US6675146B2 (en) 1993-11-18 2004-01-06 Digimarc Corporation Audio steganography
US6400827B1 (en) 1993-11-18 2002-06-04 Digimarc Corporation Methods for hiding in-band digital data in images and video
US6404898B1 (en) 1993-11-18 2002-06-11 Digimarc Corporation Method and system for encoding image and audio content
US7522728B1 (en) 1993-11-18 2009-04-21 Digimarc Corporation Wireless methods and devices employing steganography
US6496591B1 (en) 1993-11-18 2002-12-17 Digimarc Corporation Video copy-control with plural embedded signals
US6539095B1 (en) 1993-11-18 2003-03-25 Geoffrey B. Rhoads Audio watermarking to convey auxiliary control information, and media embodying same
USRE42163E1 (en) 1994-04-01 2011-02-22 Intarsia Software Llc Data management system
US6072871A (en) * 1994-10-05 2000-06-06 Leon H. Charney Method and system for identifying the source of documents generated by software and documents generated thereby
US6560349B1 (en) 1994-10-21 2003-05-06 Digimarc Corporation Audio monitoring using steganographic information
USRE41657E1 (en) 1994-10-27 2010-09-07 Makoto Saito Data management system
USRE43599E1 (en) 1994-10-27 2012-08-21 Intarsia Software Llc Data management system
US9245260B2 (en) 1994-10-27 2016-01-26 Xylon Llc Data copyright management
US6182218B1 (en) 1994-12-13 2001-01-30 Mitsubishi Corporation Digital content management system using electronic watermark
US6163842A (en) * 1994-12-14 2000-12-19 Sony Corporation Method and apparatus for embedding authentication information within digital data
US5912972A (en) * 1994-12-14 1999-06-15 Sony Corporation Method and apparatus for embedding authentication information within digital data
US6523114B1 (en) 1994-12-14 2003-02-18 Sony Corporation Method and apparatus for embedding authentication information within digital data
US6115818A (en) * 1994-12-14 2000-09-05 Sony Corporation Method and apparatus for embedding authentication information within digital data
US6047374A (en) * 1994-12-14 2000-04-04 Sony Corporation Method and apparatus for embedding authentication information within digital data
US6101604A (en) * 1994-12-14 2000-08-08 Sony Corporation Method and apparatus for embedding authentication information within digital data
US6181802B1 (en) 1995-02-06 2001-01-30 Central Research Laboratories Limited Method and apparatus for coding information by inserting codes in strongly featured image regions
WO1996027259A1 (en) * 1995-03-02 1996-09-06 Signum Technologies Limited Method of and apparatus for manipulating digital data works
US6286036B1 (en) 1995-07-27 2001-09-04 Digimarc Corporation Audio- and graphics-based linking to internet
US6311214B1 (en) 1995-07-27 2001-10-30 Digimarc Corporation Linking of computers based on optical sensing of digital data
US6542927B2 (en) 1995-07-27 2003-04-01 Digimarc Corporation Linking of computers based on steganographically embedded digital data
US5930369A (en) * 1995-09-28 1999-07-27 Nec Research Institute, Inc. Secure spread spectrum watermarking for multimedia data
WO1997040619A1 (en) * 1996-04-23 1997-10-30 Charney, Leon, H. Method and system for identifying documents generated by an unauthorized software copy
EP1968301A2 (en) 1996-05-16 2008-09-10 Digimarc Corporation Computer system linked by using information in data objects
US7388144B2 (en) 1996-07-02 2008-06-17 Yamaha Corporation Method and device for storing main information with associated additional information incorporated therein
US7015388B2 (en) 1996-07-02 2006-03-21 Yamaha Corporation Method and device for storing main information with associated additional information incorporated therein
GB2354857B (en) * 1996-07-02 2001-05-16 Yamaha Corp Method and device for storing main information with associated additional information incorporated therein
GB2354858B (en) * 1996-07-02 2001-05-30 Yamaha Corp Method and device for storing main information with associated additional information incorporated therein
GB2354857A (en) * 1996-07-02 2001-04-04 Yamaha Corp Storing main information with associated additional information incorporated therein
GB2354858A (en) * 1996-07-02 2001-04-04 Yamaha Corp Storing performance information with associated additional information incorporated therein
US7485795B2 (en) 1996-07-02 2009-02-03 Yamaha Corporation Method and device for storing main information with associated additional information incorporated therein
GB2314949B (en) * 1996-07-02 2001-04-25 Yamaha Corp Method and device for storing main information with associated additional information incorporated therein
US7361824B2 (en) 1996-07-02 2008-04-22 Yamaha Corporation Method and device for storing main information with associated additional information incorporated therein
US5848155A (en) * 1996-09-04 1998-12-08 Nec Research Institute, Inc. Spread spectrum watermark for embedded signalling
US6069914A (en) * 1996-09-19 2000-05-30 Nec Research Institute, Inc. Watermarking of image data using MPEG/JPEG coefficients
US5915027A (en) * 1996-11-05 1999-06-22 Nec Research Institute Digital watermarking
EP1811419A3 (en) * 1997-06-13 2008-10-29 Intarsia Software LLC Digital content management system using electronic watermark
EP0884669A3 (en) * 1997-06-13 1999-05-06 Mitsubishi Corporation Digital copyright management system using electronic watermark
EP0884669A2 (en) * 1997-06-13 1998-12-16 Mitsubishi Corporation Digital copyright management system using electronic watermark
US6404781B1 (en) 1997-09-02 2002-06-11 Hitachi, Ltd. Data transmission method for embedded data, data transmitting and reproducing apparatuses and information recording medium therefor
US7248607B2 (en) 1997-09-02 2007-07-24 Hitachi, Ltd. Data transmission method for embedded data, data transmitting and reproducing apparatuses and information recording medium therefor
US7317738B2 (en) 1997-09-02 2008-01-08 Hitachi, Ltd. Data transmission method for embedded data, data transmitting and reproducing apparatuses and information recording medium therefor
US6826291B2 (en) 1997-09-03 2004-11-30 Hitachi, Ltd. Method and system for embedding information into contents
EP0901274A2 (en) * 1997-09-03 1999-03-10 Hitachi, Ltd. Method and system for embedding information into contents
EP0901274A3 (en) * 1997-09-03 2000-02-23 Hitachi, Ltd. Method and system for embedding information into contents
US6728408B1 (en) 1997-09-03 2004-04-27 Hitachi, Ltd. Water-mark embedding method and system
US6108434A (en) * 1997-09-12 2000-08-22 Signafy, Inc. Counteracting geometric distortions for DCT based watermarking
US6434322B1 (en) 1997-09-17 2002-08-13 Hitachi, Ltd. Reproducing method and apparatus, for a video signal having copy control information
US6584210B1 (en) 1998-03-27 2003-06-24 Hitachi, Ltd. Digital watermark image processing method
US6724911B1 (en) 1998-06-24 2004-04-20 Nec Laboratories America, Inc. Robust digital watermarking
US6278792B1 (en) 1998-06-24 2001-08-21 Nec Research Institute, Inc. Robust digital watermarking
US6154571A (en) * 1998-06-24 2000-11-28 Nec Research Institute, Inc. Robust digital watermarking
US6738493B1 (en) 1998-06-24 2004-05-18 Nec Laboratories America, Inc. Robust digital watermarking
US6354630B1 (en) 1998-08-17 2002-03-12 Inspectron Corporation Method for embedding non-intrusive encoded data in printed matter
US6325420B1 (en) 1998-08-17 2001-12-04 Inspectron Corporation Method for embedding non-intrusive encoded data in printed matter and system for reading same
WO2000018109A1 (en) * 1998-09-23 2000-03-30 Koninklijke Philips Electronics N.V. Method for confirming the integrity of an image transmitted with a loss
DE19960769B4 (en) * 1998-12-17 2007-11-15 International Business Machines Corporation Method and system for creating an authenticatable image of an object
US7111170B2 (en) 1999-05-19 2006-09-19 Digimarc Corporation Distributed system for responding to watermarked documents
US6895556B1 (en) 1999-11-12 2005-05-17 International Business Machines Corporation System and method for providing access to displayed data

Also Published As

Publication number Publication date
GB9400971D0 (en) 1994-03-16
AU1422895A (en) 1995-08-08

Similar Documents

Publication Publication Date Title
WO1995020291A1 (en) Method of and apparatus for manipulating digital data works
US6115818A (en) Method and apparatus for embedding authentication information within digital data
US5699427A (en) Method to deter document and intellectual property piracy through individualization
US6272222B1 (en) Method of and apparatus for manipulating digital data works
US7171021B2 (en) Data processing apparatus and method, and storage medium therefor
EP1410619B1 (en) Method of invisibly embedding and hiding data into soft-copy text documents
EP3907634B1 (en) Copyright protection based on hidden copright information
Wu et al. Data hiding in digital binary image
US6512835B1 (en) Data hiding and extraction methods
EP1078312B1 (en) Apparatus for making and apparatus for reading a digital watermark and method of making and reading a digital watermark
US20010019611A1 (en) Method of and apparatus for manipulating digital data works
EP1591953B1 (en) System and method for decoding digital encoded images
EP1865459A1 (en) The method of digital watermark and the corresponding device, and digital camera which can append watermark
US6829367B1 (en) Content data judging apparatus
US10979746B2 (en) Video stream display and protection method and device
EP1405525B1 (en) Video/image communication with watermarking
Lu et al. Lossless information hiding in images
EP0854633B1 (en) Image data illegal use inhibition system
CN109166193B (en) Photographing card-punching or evidence-obtaining method based on time, position, random number and bar code
WO2003003744A1 (en) Video/image communication with watermarking
JP2003524932A (en) System and method for digitally marking files with removable marks
Sheppard et al. Digital watermarks for copyright protection
WO2005027502A1 (en) Content management system
Agarwal et al. Determining the Number of Bit Encryption That Is Optimum for Image Steganography in 8 Bit Images
CN117668787A (en) Electronic document identification encryption and anti-counterfeiting detection method based on convolutional neural network

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AU CA CN GB JP KR US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FR GB GR IE IT LU MC NL PT SE

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: CA

122 Ep: pct application non-entry in european phase