WO1997034391A1 - Watermarking process resilient to collusion attacks - Google Patents

Watermarking process resilient to collusion attacks Download PDF

Info

Publication number
WO1997034391A1
WO1997034391A1 PCT/US1997/003816 US9703816W WO9734391A1 WO 1997034391 A1 WO1997034391 A1 WO 1997034391A1 US 9703816 W US9703816 W US 9703816W WO 9734391 A1 WO9734391 A1 WO 9734391A1
Authority
WO
WIPO (PCT)
Prior art keywords
copy
watermarks
watermark
work
watermarked
Prior art date
Application number
PCT/US1997/003816
Other languages
French (fr)
Inventor
Frank Thomson Leighton
Original Assignee
Frank Thomson Leighton
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US08/615,534 external-priority patent/US5664018A/en
Application filed by Frank Thomson Leighton filed Critical Frank Thomson Leighton
Priority to EP97909004A priority Critical patent/EP0888676A1/en
Priority to AU20760/97A priority patent/AU2076097A/en
Publication of WO1997034391A1 publication Critical patent/WO1997034391A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32288Multiple embedding, e.g. cocktail embedding, or redundant embedding, e.g. repeating the additional information at a plurality of locations in the image
    • H04N1/32304Embedding different sets of additional information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/3232Robust embedding or watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0063Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0081Image watermarking whereby both original and watermarked images are required at decoder, e.g. destination-based, non-blind, non-oblivious
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0083Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91307Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
    • H04N2005/91335Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal the copy protection signal being a watermark
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • H04N2201/3236Details of authentication information generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • H04N2201/324Selecting a particular authentication information from amongst a plurality of different authentication information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3269Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
    • H04N2201/327Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs which are undetectable to the naked eye, e.g. embedded codes

Definitions

  • the present invention relates generally to preventing unlawful copying of audio, video and other media that can be digitized and, more particularly, to improved watermarking techniques that are robust even against multiple individuals who conspire together with independent copies.
  • a "watermark” is a visible or preferably invisible identification code that is permanently embedded in the data and thus remains present within the data after any decryption process.
  • a digital watermark would be a visible "seal" placed over an image to identify the copyright owner.
  • the watermark might also contain additional information, including the identity of the purchaser of a particular copy of the material.
  • Many schemes have been proposed for watermarking digital data. In a known watermarking procedure, each copy of a document D is varied slightly so as to look the same to the user but also so as to include the identity of the purchaser.
  • the watermark consists of the variations that are unique to each copy. The idea behind such schemes is that the watermark should be hard to remove without destroying the document. Thus, a copy of a watermarked document should be traceable back to the specific version of the original from which it was created.
  • each of a set of copies of the work has a slightly-modified form of a "baseline” watermark that is placed within a critical region of the data.
  • the slight variations in the watermarks are not perceptually visible and do not interfere with the works. If multiple persons collude to attempt to create an "illicit" copy of the work (i.e., a copy without a watermark), however, at least one of the modified watermarks is present in the copy, thereby identifying both the illicit copy and the copier.
  • the work to be protected is digitized into a data file or string of data.
  • a first digital watermark is then inserted in a first copy of the data file, preferably in a critical region of the data.
  • a "critical" region may consist of the entire document or alternatively will be some valuable portion of the work that will end up being significantly corrupted if the watermark is corrupted.
  • a second digital watermark is then inserted in a second copy of the data file in a similar manner, and the process is repeated for additional copies.
  • the first and second digital watermarks are slight variations of a "baseline" watermark, which is kept secret, and one cannot perceive any differences between the first and second copies due to these variations.
  • the baseline watermark may be a digital string that is part of the original data being protected.
  • the variations are "randomized” in such a manner that if two persons were to collude to attempt to create an "illicit" copy of the work (i.e., a copy without a watermark), at least one of the first or second watermarks would still be present in the copy. After the watermark is inserted into the work, the work can be converted back to its original form.
  • the scheme ensures that different possessors of watermarked copies of a work cannot create a "clean" copy that does not include at least one of the slightly-modified watermarks. Indeed, by comparing the watermark of the illicit copy with the baseline watermark, one can determine the identity of the forger.
  • FIGURE 1 is a block diagram illustrating the method of inserting a digital watermark into a copy
  • FIGURE 2 is a block diagram illustrating the method for retrieving a digital watermark from a copy and correlating the retrieved watermark with a stored watermark.
  • the work to be protected may be an image (photographs and graphics), video and/or audio (speech and music).
  • image photographs and graphics
  • video and/or audio speech and music
  • the particular type of work is not relevant to the invention.
  • the work in whatever form, is digitized at step 10 into a data file or string of data either as part of the inventive technique or through some known A/D preprocessing.
  • a “baseline” watermark that is preferably stored and not used in making a particular copy of the work (although this step is not necessarily required).
  • This baseline watermark is then processed to create a set of one or more "modified" watermarks, each of which is related to the baseline watermark in a predetermined manner.
  • the "offsets" needed to create the modified watermarks are not fixed, however, but are "randomized.” In this way, a very small amount of "noise” is added to the offsets that does not alter the perception of the watermarked copies but still ensures that possessors of such copies cannot collude to remove all existence of the watermark in at least one illicit copy.
  • collusion-type attacks are prevented according to the invention by constructing a watermark using randomness in a specific way.
  • an n-length digital string: XT ,X 2 ...,x n is derived at step 1 2 from the data to be watermarked and stored at step 14 for future reference. This may be referred to as the "baseline" watermark.
  • the string is preferably "critical" to the data in that corruption of the string will corrupt the data in a way that can be perceived and which will diminish the value of the corrupted document.
  • Generation of the baseline watermark can be achieved in many ways, e.g., by digitizing some portion of the document and using the resulting data or some subset thereof. (Whatever method is used is also used in the verification process, as discussed below).
  • An n-length watermark vector 1 ( w 2 , ...w n , is then created at step 1 6 and stored at step 1 8 for future reference.
  • the vector is preferably created by choosing each w, from a specified random distribution (preferably the normal distribution).
  • may or may not be the same (e.g., depending on whether it is desired to embed some specific serial number data in the watermark).
  • the watermark vector is then added at step 20 to the string x 1 ,x 2 , ..., x n . and the result reinserted at step 22 into the original data to be protected.
  • the work may then be converted back to its original form (image, video, audio, etc.) at step 24.
  • step 34 by retrieving the original base line watermark, x 1 f x 2 , ...x n , from memory and subtracting out x 1 ,x 2 , ...x n from x ',x 2 '' —* n to compute a derived watermark w 1 ',w 2 ', ...w n ' at step 36.
  • a correlation value (preferably an inner product) is then calculated between the derived watermark and w ( w 2 , ... w n retrieved at step 38, to produce a correlation value at step 40.
  • the correlation value is compared at step 42 to threshold levels, and if the correlation is high (step 44), then there is a match and a watermark is present. If the correlation is low (step 46), the watermark is not present.
  • the inner product scheme works by computing the absolute value of the sum WT W-I ' + ... + w n w n ').
  • a first digital watermark is inserted in a first copy of a data file, preferably in a critical region of the data.
  • a second digital watermark is then inserted in a second copy of the data file in a similar manner, and the process is repeated for additional copies.
  • the first and second digital watermarks are slight variations of a "baseline” watermark, which is kept secret, and one cannot perceive any differences between the first and second copies due to these variations.
  • the variations are "randomized” in such a manner that if two persons were to collude to attempt to create an "illicit" copy of the work (i.e., a copy without a watermark), at least one of the first or second watermarks would still be present in the copy.
  • the watermark may consist of a number (e.g., 1000) of randomly generated numbers with a normal distribution having zero mean and unity variance.
  • could be selected according to N( ⁇ j, ⁇ ,) where ⁇ ... ⁇ n can be a serial number corresponding to the copy being watermarked (or other information that may be embedded).
  • cor(W,W)
  • the correlation will be low if the watermark is not present and the work is not destroyed.
  • the correlation will be high if D' was derived from the watermarked document or if the data has been corrupted beyond recognition (the latter condition being determined by inspection).
  • each of the "modified" watermarks be placed in a critical region of the data.
  • the exact location will depend on the nature of the work being protected. It is also helpful if every entry in this region of data is largely uncorrelated with the other data. It has been suggested (by Cox et al) that this can be accomplished by embedding a watermark in the spectrum of an image, the temporal frequency domain of an audio signal, or the spatio-temporal frequency domain of a video sequence.
  • the above techniques are preferred, one may even encode the watermark in other less, desirable places (such as in the low order or least significant bits) of the data and still obtain the advantages of the collusion-resistant feature of the invention where multiple parties may collude to remove the watermark. Variations
  • the original document (or an original baseline watermark vector) is stored in order to determine whether the watermark is present in a copy of the document.
  • the original baseline watermark vector is retrieved at step 34 and subtracted from the derived baseline watermark vector to produce the derived offset watermark vector. This step can be omitted without changing the detection protocol or its results.
  • the derived offset watermark vector may be set equal to the derived baseline watermark vector. This change increases the noise level in the correlation test, but not beyond tolerable levels.
  • the noise levels can be reduced by specially selecting the original offset watermark vectors to have low noise (e.g., by selecting them to be orthogonal to the original baseline watermark vector to which they are being applied) or by running the correlation test on only specific components of the vectors.
  • Another improvement would be to remove the need to store the original offset watermark vector.
  • it is necessary to store a copy of the original offset watermark vectors see, e.g., step 18) so that they can be later retrieved and correlated with the derived offset watermark vectors (see, e.g., step 38).
  • This step can be largely omitted by the following process.
  • the original offset watermark vectors are computed using a secret random hash function H.
  • the sequence of numbers preferably has same structure and function as discussed above and appear to be random, but the sequence is easily reconstructed given the secret function H and the underlying information to be inserted into the document. Hence, a watermark is identified by reconstructing the original offset watermark vector locally instead of retrieving the vector from a database.
  • the text to be embedded may be a simple serial number, and this serial number can be retrieved from the document by checking all possibilities to see if there is a correlation. This check can be done locally if H is available, since all relevant original offset vectors can be regenerated as needed.
  • the correlation test generates the old dot product (which is large, precisely what is desired) plus the dot product of the offset vector and the original picture. Since the offset vector is random, this dot product is small (in the noise range) for any picture. Therefore, one does not need the original picture to do the correlation test.
  • the secret random hash function H maps a copyright notice or text into a sequence of independent Gaussian offsets (i.e., an offset vector). Then, one may choose the offset vector for some text to be H(text). Now, one need only remember the text, not the whole offset vector. The text may be timestamped so that the same offset vector is only used once, although one can use the same offset vector more than once.
  • This method is provably secure, even against colluders, but has low memory requirements.
  • a two-tiered version, wherein there are two hash functions (one for the sign and one for the magnitude of the offsets) might be used as well. In this way, one of the two (sign or magnitude) would be kept in reserve and not released, even in the secure software.
  • the hardware/software that creates the watermarks is in secure hands (so that H remains secret and cannot be misused). For example, if the adversary is allowed to watermark a blank document, then the scheme can lose security. There are several ways, however, that security can be enhanced as is now explained. In one approach, it is assumed that each copy of the watermarking software produces watermarks unique to the copy. For example, the XYZ Corporation watermarking software produces watermarks of the form H(XYZCORP
  • the original offset watermark vectors can be derived as a function of the document that is being watermarked in addition to the text that is being embedded into the document. This has the effect of making watermarks corresponding to "Do not copy" be different for each document in which they appear. For example, one might use H(x_1 ...X_n

Abstract

The work to be protected by the watermark is first digitized (10), and then the baseline watermark vector is derived (12) and stored (14). Also, a watermark offset vector is created (16) and stored (18). The watermark offset vector and the baseline watermark vector are added together to generate a modified watermark vector (20). Next, the baseline watermark vector is replaced by the modified watermark vector in the digitized work to be protected (22). Finally, the watermarked work is returned to its original form (24).

Description

7/34391 - 1 - PC17US97/03816
Watermarking Process Resilient to Collusion Attacks
TECHNICAL FIELD
The present invention relates generally to preventing unlawful copying of audio, video and other media that can be digitized and, more particularly, to improved watermarking techniques that are robust even against multiple individuals who conspire together with independent copies. BACKGROUND OF THE INVENTION
The proliferation of digitized media (audio, image and video) and the ease with which digital files can be copied has created a need for copyright enforcement schemes. Conventional cryptographic systems permit only valid keyholders access to encrypted data, but once such data is decrypted there is no way to track its reproduction or retransmission. Such schemes thus provide insufficient protection against unauthorized reproduction of information. It is known in the prior art to provide a so-called digital "watermark" on a document to address this problem. A "watermark" is a visible or preferably invisible identification code that is permanently embedded in the data and thus remains present within the data after any decryption process. One example of a digital watermark would be a visible "seal" placed over an image to identify the copyright owner. However, the watermark might also contain additional information, including the identity of the purchaser of a particular copy of the material. Many schemes have been proposed for watermarking digital data. In a known watermarking procedure, each copy of a document D is varied slightly so as to look the same to the user but also so as to include the identity of the purchaser. The watermark consists of the variations that are unique to each copy. The idea behind such schemes is that the watermark should be hard to remove without destroying the document. Thus, a copy of a watermarked document should be traceable back to the specific version of the original from which it was created. Although many prior art schemes claim to possess the
"unremovable" property, all existing schemes are easily defeated by the following type of attack. Assume the attacker obtains two copies of the document that is being protected by the watermarking scheme. Each copy may have a different watermark, neither of which is supposed to be removable. The attacker now makes a third version of the document (which he hopes will not have a traceable watermark) by averaging his two copies. For a pictorial document, for example, each pixel of the third version would be the average of the corresponding pixels in the watermarked copies. Using existing approaches to watermarking, the third copy of the document produced by the attacker will look like the original versions but the watermark will be destroyed. This is because the "average" of two watermarks does not carry sufficient information to be tied to either of the watermarks individually. Thus, the watermarking scheme can be rendered ineffective by simply averaging two copies of the document.
There is thus a need to devise a watermarking scheme that is immune to these and other such attacks, especially those in which the adversary obtains multiple copies of the original document. BRIEF SUMMARY OF THE INVENTION
It is the principal object of the invention to describe a digital watermarking scheme wherein the watermark is robust against collusion by multiple individuals who each possess a watermarked copy of the data. It is another object to describe such a scheme wherein the watermark cannot be removed by an adversary who obtains multiple copies of the original work.
It is a more general object of the invention to describe a watermarking method that is secure against any form of attack including, without limitation, averaging attacks.
It is still a further object of the invention to describe a watermarking procedure wherein each of a set of copies of the work has a slightly-modified form of a "baseline" watermark that is placed within a critical region of the data. The slight variations in the watermarks, however, are not perceptually visible and do not interfere with the works. If multiple persons collude to attempt to create an "illicit" copy of the work (i.e., a copy without a watermark), however, at least one of the modified watermarks is present in the copy, thereby identifying both the illicit copy and the copier.
It is still thus another object to describe a watermarking scheme of the type recited above wherein combining copies of the same data set does not destroy the watermark. It is a further object of the invention to describe such a watermarking scheme that may be used to identify one or more of the parties who are colluding to destroy the watermark.
It is another more general object of the invention to describe a digital watermarking process that may be used as evidence in a Court because it is robust against collusion.
According to the preferred embodiment of the invention, the work to be protected is digitized into a data file or string of data. A first digital watermark is then inserted in a first copy of the data file, preferably in a critical region of the data. A "critical" region may consist of the entire document or alternatively will be some valuable portion of the work that will end up being significantly corrupted if the watermark is corrupted. A second digital watermark is then inserted in a second copy of the data file in a similar manner, and the process is repeated for additional copies. According to the invention, the first and second digital watermarks are slight variations of a "baseline" watermark, which is kept secret, and one cannot perceive any differences between the first and second copies due to these variations. The baseline watermark may be a digital string that is part of the original data being protected. Preferably, the variations are "randomized" in such a manner that if two persons were to collude to attempt to create an "illicit" copy of the work (i.e., a copy without a watermark), at least one of the first or second watermarks would still be present in the copy. After the watermark is inserted into the work, the work can be converted back to its original form.
Thus, the scheme ensures that different possessors of watermarked copies of a work cannot create a "clean" copy that does not include at least one of the slightly-modified watermarks. Indeed, by comparing the watermark of the illicit copy with the baseline watermark, one can determine the identity of the forger.
Although not meant to be limiting, preferably the "variations" are generated using a "random" offset, and in particular a "normal distribution." BRIEF DESCRIPTION OF THE DRAWINGS For a more complete understanding of the present invention and the advantages thereof, reference should be made to the following Detailed Description taken in connection with the accompanying drawings in which: FIGURE 1 is a block diagram illustrating the method of inserting a digital watermark into a copy; and
FIGURE 2 is a block diagram illustrating the method for retrieving a digital watermark from a copy and correlating the retrieved watermark with a stored watermark. DETAILED DESCRIPTION
According to the invention, the work to be protected may be an image (photographs and graphics), video and/or audio (speech and music). The particular type of work is not relevant to the invention. Referring now to FIGURE 1 , the work, in whatever form, is digitized at step 10 into a data file or string of data either as part of the inventive technique or through some known A/D preprocessing. In the invention, there is a "baseline" watermark that is preferably stored and not used in making a particular copy of the work (although this step is not necessarily required). This baseline watermark is then processed to create a set of one or more "modified" watermarks, each of which is related to the baseline watermark in a predetermined manner. Preferably, the "offsets" needed to create the modified watermarks are not fixed, however, but are "randomized." In this way, a very small amount of "noise" is added to the offsets that does not alter the perception of the watermarked copies but still ensures that possessors of such copies cannot collude to remove all existence of the watermark in at least one illicit copy. In general, collusion-type attacks are prevented according to the invention by constructing a watermark using randomness in a specific way. Preferably, an n-length digital string: XT ,X2 ...,xn is derived at step 1 2 from the data to be watermarked and stored at step 14 for future reference. This may be referred to as the "baseline" watermark. The string is preferably "critical" to the data in that corruption of the string will corrupt the data in a way that can be perceived and which will diminish the value of the corrupted document. Generation of the baseline watermark can be achieved in many ways, e.g., by digitizing some portion of the document and using the resulting data or some subset thereof. (Whatever method is used is also used in the verification process, as discussed below). An n-length watermark vector 1 (w2, ...wn, is then created at step 1 6 and stored at step 1 8 for future reference. The vector is preferably created by choosing each w, from a specified random distribution (preferably the normal distribution). The random distribution used for each W| may or may not be the same (e.g., depending on whether it is desired to embed some specific serial number data in the watermark). The watermark vector is then added at step 20 to the string x1 ,x2, ..., xn. and the result reinserted at step 22 into the original data to be protected. The work may then be converted back to its original form (image, video, audio, etc.) at step 24.
Assume it is now desired to retrieve the watermark from a copy D'. This can be accomplished, as shown generally in FIGURE 2, by digitizing the copy D' at step 30 and then computing at step 32 the derived values x-, ' ,x2' ', ...xn'» using the same algorithm used to compute the baseline watermark. Then, the method proceeds at step 34 by retrieving the original base line watermark, x1 fx2, ...xn, from memory and subtracting out x1 ,x2, ...xn from x ',x2'' —*n to compute a derived watermark w1 ',w2', ...wn' at step 36. A correlation value (preferably an inner product) is then calculated between the derived watermark and w (w2, ... wn retrieved at step 38, to produce a correlation value at step 40. The correlation value is compared at step 42 to threshold levels, and if the correlation is high (step 44), then there is a match and a watermark is present. If the correlation is low (step 46), the watermark is not present. (The inner product scheme works by computing the absolute value of the sum WT W-I ' + ... + wnwn').
This scheme is immune to collusion because the watermark is random and because different watermarks are completely uncorrelated. In existing schemes, different watermarks are highly correlated and so it is easy for an attacker to exploit the correlation to destroy the watermark (e.g., by an averaging attack). In the invention method, there is simply not enough information contained in "t" different watermarked copies of the data in order for the adversary to remove the watermark. More specifically, if the attacker obtains "t" copies of watermarked data using the normal distribution to construct the watermarks (with watermarks w , ... w1 n, through wt1 , ... wtn), it will appear to the attacker as if the original baseline watermark is x, + (w + ... + w1n)/t, xn + (wtl + ... + w)/t, which is not the true baseline watermark x,, ...xn. The distinction is important since the former string is correlated with each of the watermarks w ...w1 n through wt1 ... wtn. In other words, the attacker simply does not have enough information in order to evade the watermark, no matter what sort of attack is used. Hence, one can prove that either the attacker must destroy the data or he must leave a trace of at least one of the component watermarks which will be revealed when the correlation test is run. Only someone with knowledge of the original baseline watermark could remove the watermark without detection.
Therefore, "m" copies of the work include variations of a baseline watermark such that up to "t" persons who possess those - o -
copies cannot collude to create a "clean" copy (i.e., one without any watermark whatsoever). Stated another way, any "t" persons who collude in such a manner will always create an illicit copy that includes one of the modified watermarks. Comparison of the watermark of the illicit copy with the baseline watermark then identifies what party made the copy (assuming there is a record of which party originally got which "version").
According to a preferred method, a first digital watermark is inserted in a first copy of a data file, preferably in a critical region of the data. A second digital watermark is then inserted in a second copy of the data file in a similar manner, and the process is repeated for additional copies. As discussed above, the first and second digital watermarks are slight variations of a "baseline" watermark, which is kept secret, and one cannot perceive any differences between the first and second copies due to these variations. Preferably, the variations are "randomized" in such a manner that if two persons were to collude to attempt to create an "illicit" copy of the work (i.e., a copy without a watermark), at least one of the first or second watermarks would still be present in the copy. In the preferred embodiment, a watermark consists of a sequence of real numbers W = w1 ( ... ,wn, where each value w, is chosen independently according to /V(0, 1 ) (where μ, σ2) denotes a normal distribution with mean μ and variance σ2). The watermark may consist of a number (e.g., 1000) of randomly generated numbers with a normal distribution having zero mean and unity variance. Alternatively, W| could be selected according to N(μj, σ,) where μ ... μn can be a serial number corresponding to the copy being watermarked (or other information that may be embedded). In order to detect the presence of a watermark W in a derived watermark signal W, we preferably use a correlation function cor(W,W) = | W* W'I , which is the inner product of two vectors. If
W were selected according to the normal N(0, 1 ) distribution and W is uncorrelated to W (but of the same order), then the correlation will be small (about V/i ). If W is closely correlated to W, then the correlation will be large (about n). If W is uncorrelated to W but is of a larger order ( e.g., due to intentional or unintentional noise or attempts to hide the watermark), then the correlation might also be large. (Specifically, if W is uncorrelated to W but has B times the magnitude, then the correlation is about B Jn . If B is large, then the data D' will not resemble D. (The notion of large in this context depends on the application and the level of security/clarity desired). In any event, the watermark is said to be present if cor(W,W) > c >Fn , where c is a predetermined constant that depends on the application and level of security desired (e.g., c = 4).
The correlation will be low if the watermark is not present and the work is not destroyed. The correlation will be high if D' was derived from the watermarked document or if the data has been corrupted beyond recognition (the latter condition being determined by inspection).
As noted above, it is preferable that each of the "modified" watermarks be placed in a critical region of the data. Of course, the exact location will depend on the nature of the work being protected. It is also helpful if every entry in this region of data is largely uncorrelated with the other data. It has been suggested (by Cox et al) that this can be accomplished by embedding a watermark in the spectrum of an image, the temporal frequency domain of an audio signal, or the spatio-temporal frequency domain of a video sequence. Although the above techniques are preferred, one may even encode the watermark in other less, desirable places (such as in the low order or least significant bits) of the data and still obtain the advantages of the collusion-resistant feature of the invention where multiple parties may collude to remove the watermark. Variations
In the embodiment discussed above, the original document (or an original baseline watermark vector) is stored in order to determine whether the watermark is present in a copy of the document. In the embodiment previously described, the original baseline watermark vector is retrieved at step 34 and subtracted from the derived baseline watermark vector to produce the derived offset watermark vector. This step can be omitted without changing the detection protocol or its results. In particular, the derived offset watermark vector may be set equal to the derived baseline watermark vector. This change increases the noise level in the correlation test, but not beyond tolerable levels. Further, the noise levels can be reduced by specially selecting the original offset watermark vectors to have low noise (e.g., by selecting them to be orthogonal to the original baseline watermark vector to which they are being applied) or by running the correlation test on only specific components of the vectors.
Another improvement would be to remove the need to store the original offset watermark vector. As discussed above, in one embodiment of the invention it is necessary to store a copy of the original offset watermark vectors (see, e.g., step 18) so that they can be later retrieved and correlated with the derived offset watermark vectors (see, e.g., step 38). This step can be largely omitted by the following process.
The original offset watermark vectors are computed using a secret random hash function H. The function H maps copyright and other information that the user desires to embed in he document (e.g., "This picture is the property of XYZ Corp., unauthorized copying is forbidden") to the sequence of numbers W = w_1 , ..., w_n that was used as the original offset watermark vector. The sequence of numbers preferably has same structure and function as discussed above and appear to be random, but the sequence is easily reconstructed given the secret function H and the underlying information to be inserted into the document. Hence, a watermark is identified by reconstructing the original offset watermark vector locally instead of retrieving the vector from a database. More generally, the text to be embedded may be a simple serial number, and this serial number can be retrieved from the document by checking all possibilities to see if there is a correlation. This check can be done locally if H is available, since all relevant original offset vectors can be regenerated as needed. Thus, according to this variation of the present invention, one need not subtract the original picture before carrying out the dot product form of the correlation test described above in the main embodiment. In such case, the correlation test generates the old dot product (which is large, precisely what is desired) plus the dot product of the offset vector and the original picture. Since the offset vector is random, this dot product is small (in the noise range) for any picture. Therefore, one does not need the original picture to do the correlation test. Moreover, by using the secret random hash function H, one need not store the offset vectors. The function maps a copyright notice or text into a sequence of independent Gaussian offsets (i.e., an offset vector). Then, one may choose the offset vector for some text to be H(text). Now, one need only remember the text, not the whole offset vector. The text may be timestamped so that the same offset vector is only used once, although one can use the same offset vector more than once.
This method is provably secure, even against colluders, but has low memory requirements. A two-tiered version, wherein there are two hash functions (one for the sign and one for the magnitude of the offsets) might be used as well. In this way, one of the two (sign or magnitude) would be kept in reserve and not released, even in the secure software.
The above-described variants can be combined advantageously to provide a scheme to prevent unauthorized copying of certain media such as CD's and VCR videos. In this application, a given text - such as "Do not copy" -- is used as the watermark. A VCR can then check for the presence of this watermark before allowing the copying to take place. This would be achieved by having the secret function H embedded in the VCR software or hardware in a secure fashion, e.g., through a secure chip or via a protected software encryption scheme. The value of H would also be embedded securely in the hardware or software that generates the watermarked copy in the first place instance.
In the VCR/CD application, it may only be necessary to use a single watermark for many copies of the document, in which case it may only be necessary to use a single watermark offset vector (e.g., H ("Do not copy")) for different documents. In this variant, the system must be secure against a different kind of collusion; namely, one in which the same watermark is used with different documents instead of the case where the same document is used with different watermarks. Fortunately, the same analysis applies to both scenarios equally well, such that either scheme is secure against collusion.
In the above-described variant, the hardware/software that creates the watermarks is in secure hands (so that H remains secret and cannot be misused). For example, if the adversary is allowed to watermark a blank document, then the scheme can lose security. There are several ways, however, that security can be enhanced as is now explained. In one approach, it is assumed that each copy of the watermarking software produces watermarks unique to the copy. For example, the XYZ Corporation watermarking software produces watermarks of the form H(XYZCORP | Do not copy). Then, only the watermarks produced by that software would be compromised if the XYZ software were stolen. (For simplicity, each version of the software could be the same except for a special key unique to the version.) Alternatively, the original offset watermark vectors can be derived as a function of the document that is being watermarked in addition to the text that is being embedded into the document. This has the effect of making watermarks corresponding to "Do not copy" be different for each document in which they appear. For example, one might use H(x_1 ...X_n | Do not copy) as the original offset watermark vector for a document with features x_1 ,...,x_n into which the "Do not copy" text is embedded. Even further, the string x_1 ,...,x_n may include random numbers so that offset vectors can be further differentiated in an effort to prevent attacks.
In order to confirm the presence of a watermark in the preceding examples, one still needs to know (or guess, perhaps by exhaustive search) the underlying text that was used to generate the original offset vector. This process can be simplified by embedding serial numbers instead of text. Once the serial number is retrieved, a global database is consulted to find out what the text is. However, it is still necessary to be careful how a serial number is embedded since exhaustive search over a space of 12-digit numbers would be costly and difficult. In such a case, it would be much better to separately embed say four (4) serial numbers, each with 3 digits. (Of course, such numbers and their characteristics are merely exemplary). Then, one would only have to search over a space of 1000 numbers (instead of 1 ,000,000,000,000 numbers) four times. (This technique makes use of the fact that the watermarking procedures can be used to embed more than one watermark in a document.)
It is also possible to make the watermarking process more resilient to noise as well as more secure. This is achieved as follows. Suppose that one desires to embed the text "Do not copy" in a document. Another good way of doing this is to embed multiple offset watermark vectors in the document. For example, we could use H(y_1 | Do not copy), H(y_2 | Do not copy), ..., H(y_m | Do not copy) for different values of y_1 , ..., y_m as the vectors. If any of the watermarks is detected, then copying would not proceed. Such a scheme is more robust since all m vectors would have to be ruined by noise or be removed by an adversary before copying could proceed. If there is a chance p of being able to remove any one of the vectors, then the change of losing all m is pAm (assuming independence), which is very small (e.g., if p = .01 and m =4, then pΛm = 10A{-8}).

Claims

IN THE CLAIMS
1 . A watermarking method, comprising the steps of:
(a) generating a digital string from the work to form a baseline watermark; (b) generating a set of watermarks each having a predetermined relationship to the baseline watermark; and
(c) inserting a respective one of the set of watermarks into a respective copy of the work to create a watermarked copy uniquely identified by the respective one of the set of watermarks; and (d) repeating step (c) at least m times to create a set of m watermarked copies, each having a different one of the set of watermarks therein, such that if a subset of said m watermarked copies are averaged to produce an illicit copy of the work, at least one of the set of watermarks is detectable in the illicit copy.
2. The method as described in Claim 1 wherein the predetermined relationship is a set of random offsets.
3. The method as described in Claim 2 wherein the random offsets have a normal distribution having zero mean and unity variance.
4. The method as described in Claim 1 wherein the work includes an image.
5. The method as described in Claim 1 wherein the work includes an audio signal.
6. The method as described in Claim 1 wherein the work includes a video signal.
7. The method as described in Claim 1 wherein each of the watermarks is inserted in a critical region of the digital data file.
8. The method as described in Claim 1 further including the step of comparing the watermark in the illicit copy with the baseline watermark to determine which possessor of a copy of the work created the illicit copy.
9. A method of securing a work against copying, comprising the steps of:
(a) generating a set of watermarks each comprising a vector of randomly-generated numbers; and
(b) inserting a respective one of the set of watermarks into a respective copy of the work to create a watermarked copy uniquely identified by the respective one of the set of watermarks; and
(c) repeating step (b) at least m times to create a set of m watermarked copies, each having a different one of the set of watermarks therein, such that if a subset of said m watermarked copies are averaged to produce an illicit copy of the work, at least one of the set of watermarks is detectable in the illicit copy.
1 0. The method as described in Claim 9 wherein the work includes an image.
1 1 . The method as described in Claim 9 wherein the work includes an audio signal.
12. The method as described in Claim 9 wherein the work includes a video signal.
13. The method as described in Claim 9 further including the step of comparing the watermark in the illicit copy with the set of watermarks to determine which possessor of a copy of the work created the illicit copy.
14. A method of protecting a work against illicit copying, comprising the steps of:
(a) generating a set of watermarks each having a predetermined relationship to a first watermark for the work; and
(b) inserting a respective one of the set of watermarks into a respective copy of the work to create a watermarked copy uniquely identified by the respective one of the set of watermarks; and
(c) repeating step (b) at least m times to create a set of m watermarked copies, each having a different one of the set of watermarks therein, wherein averaging a pair of said m watermarked copies generates a copy of the work in which at least one of the set of watermarks can be detected.
15. The method as described in Claim 14 wherein the baseline watermark is derived from the work. - 1 o -
16. A method of generating secure copies of a document, comprising the steps of:
(a) generating a set of watermarks each comprising a vector of randomly-generated numbers with a normal distribution having zero mean and unity variance; [and]
(b) inserting a respective one of the set of watermarks into a respective copy of the document to create a watermarked copy uniquely identified by the respective one of the set of watermarks; and (c) repeating step (b) at least m times to create a set of m watermarked copies of the document that are secure against illicit copying.
17. A method of generating secure copies of a document, comprising the steps of:
(a) generating a set of watermarks each comprising a vector of randomly-generated numbers;
(b) inserting a respective one of the set of watermarks into a respective copy of the document to create a watermarked copy uniquely identified by the respective one of the set of vectors; and
(c) repeating step (b) at least m times to create a set of m watermarked copies of the document that are secure against illicit copying.
PCT/US1997/003816 1996-03-12 1997-03-12 Watermarking process resilient to collusion attacks WO1997034391A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP97909004A EP0888676A1 (en) 1996-03-12 1997-03-12 Watermarking process resilient to collusion attacks
AU20760/97A AU2076097A (en) 1996-03-12 1997-03-12 Watermarking process resilient to collusion attacks

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US08/615,534 1996-03-12
US08/615,534 US5664018A (en) 1996-03-12 1996-03-12 Watermarking process resilient to collusion attacks
US67986396A 1996-07-15 1996-07-15
US08/679,863 1996-07-15

Publications (1)

Publication Number Publication Date
WO1997034391A1 true WO1997034391A1 (en) 1997-09-18

Family

ID=27087532

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1997/003816 WO1997034391A1 (en) 1996-03-12 1997-03-12 Watermarking process resilient to collusion attacks

Country Status (3)

Country Link
EP (1) EP0888676A1 (en)
AU (1) AU2076097A (en)
WO (1) WO1997034391A1 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1089550A2 (en) * 1999-09-30 2001-04-04 Kabushiki Kaisha Toshiba Code generating method and unit thereof, code detecting method and unit thereof, and watermark embedding unit and watermark detecting unit
WO2001031910A1 (en) * 1999-10-28 2001-05-03 Microsoft Corporation Methods and systems for fingerprinting digital data
GB2358100A (en) * 1999-11-30 2001-07-11 Ibm Digital watermarks
US6466670B1 (en) 1998-05-21 2002-10-15 Nds Limited System for preventing playback of unauthorized digital video recordings
AU768687B2 (en) * 1998-12-03 2003-12-18 Hitachi Limited Method of and apparatus for restricting copy of digital information and apparatus for recording digital information
US7007165B1 (en) 1999-05-02 2006-02-28 Nds Limited Watermark system
US7047413B2 (en) 2001-04-23 2006-05-16 Microsoft Corporation Collusion-resistant watermarking and fingerprinting
US7231400B2 (en) 2000-11-30 2007-06-12 Microsoft Corporation Dynamically generating multiple hierarchies of inter-object relationships based on object attribute values
US7246136B2 (en) 2001-11-26 2007-07-17 Microsoft Corporation Dynamically generated schema representing multiple hierarchies of inter-object relationships
US7334197B2 (en) 2000-07-19 2008-02-19 Microsoft Corporation Display and management of data within hierarchies and polyarchies of information
US7359907B2 (en) 2001-11-26 2008-04-15 Microsoft Corporation Extending a directory schema independent of schema modification
US7389335B2 (en) 2001-11-26 2008-06-17 Microsoft Corporation Workflow management based on an integrated view of resource identity

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5488664A (en) * 1994-04-22 1996-01-30 Yeda Research And Development Co., Ltd. Method and apparatus for protecting visual information with printed cryptographic watermarks
US5530759A (en) * 1995-02-01 1996-06-25 International Business Machines Corporation Color correct digital watermarking of images

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5488664A (en) * 1994-04-22 1996-01-30 Yeda Research And Development Co., Ltd. Method and apparatus for protecting visual information with printed cryptographic watermarks
US5530759A (en) * 1995-02-01 1996-06-25 International Business Machines Corporation Color correct digital watermarking of images

Cited By (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6466670B1 (en) 1998-05-21 2002-10-15 Nds Limited System for preventing playback of unauthorized digital video recordings
SG104257A1 (en) * 1998-12-03 2004-06-21 Pioneer Corp Method of and apparatus for restricting copy of digital information, and apparatus for recording digital information
AU768687B2 (en) * 1998-12-03 2003-12-18 Hitachi Limited Method of and apparatus for restricting copy of digital information and apparatus for recording digital information
US7200751B2 (en) 1999-05-02 2007-04-03 Nds Limited Watermark system
US7802100B2 (en) 1999-05-02 2010-09-21 Nds Limited Watermark system
EP2360915A2 (en) 1999-05-02 2011-08-24 NDS Limited Watermark system
US7007165B1 (en) 1999-05-02 2006-02-28 Nds Limited Watermark system
US7624273B2 (en) 1999-09-30 2009-11-24 Kabushiki Kaisha Toshiba Code generating method and unit thereof, code detecting method and unit thereof, and watermark embedding unit and watermark detecting unit
EP1089550A3 (en) * 1999-09-30 2003-04-16 Kabushiki Kaisha Toshiba Code generating method and unit thereof, code detecting method and unit thereof, and watermark embedding unit and watermark detecting unit
EP1089550A2 (en) * 1999-09-30 2001-04-04 Kabushiki Kaisha Toshiba Code generating method and unit thereof, code detecting method and unit thereof, and watermark embedding unit and watermark detecting unit
US6901515B1 (en) 1999-09-30 2005-05-31 Kabushiki Kaisha Toshiba Code generating method and unit thereof, code detecting method and unit thereof, and watermark embedding unit and watermark detecting unit
EP1619872A2 (en) * 1999-09-30 2006-01-25 Kabushiki Kaisha Toshiba Code generating method and unit thereof, code detecting method and unit thereof, and watermark embedding unit and watermark detecting unit
EP1624359A2 (en) * 1999-09-30 2006-02-08 Kabushiki Kaisha Toshiba Code generating method and unit thereof, code detecting method and unit therof, and watermark embedding unit and watermark detecting unit
US7082537B2 (en) 1999-09-30 2006-07-25 Kabushiki Kaisha Toshiba Code generating method and unit thereof, code detecting method and unit thereof, and watermark embedding unit and watermark detecting unit
EP1624359A3 (en) * 1999-09-30 2006-03-01 Kabushiki Kaisha Toshiba Code generating method and unit thereof, code detecting method and unit therof, and watermark embedding unit and watermark detecting unit
EP1619872A3 (en) * 1999-09-30 2006-03-15 Kabushiki Kaisha Toshiba Code generating method and unit thereof, code detecting method and unit thereof, and watermark embedding unit and watermark detecting unit
US6754364B1 (en) 1999-10-28 2004-06-22 Microsoft Corporation Methods and systems for fingerprinting digital data
US7200244B2 (en) 1999-10-28 2007-04-03 Microsoft Corporation Systems for fingerprinting digital data
US7158655B2 (en) 1999-10-28 2007-01-02 Microsoft Corporation Systems for fingerprinting digital data
US7177442B2 (en) 1999-10-28 2007-02-13 Microsoft Corporation Methods and systems for fingerprinting digital data
WO2001031910A1 (en) * 1999-10-28 2001-05-03 Microsoft Corporation Methods and systems for fingerprinting digital data
GB2358100A (en) * 1999-11-30 2001-07-11 Ibm Digital watermarks
GB2358100B (en) * 1999-11-30 2004-03-17 Ibm Digital watermarks
US6807634B1 (en) 1999-11-30 2004-10-19 International Business Machines Corporation Watermarks for customer identification
US7334197B2 (en) 2000-07-19 2008-02-19 Microsoft Corporation Display and management of data within hierarchies and polyarchies of information
US7603374B2 (en) 2000-11-30 2009-10-13 Microsoft Corporation Dynamically generating multiple hierarchies of inter-object relationships based on object attribute values
US7231400B2 (en) 2000-11-30 2007-06-12 Microsoft Corporation Dynamically generating multiple hierarchies of inter-object relationships based on object attribute values
US7047413B2 (en) 2001-04-23 2006-05-16 Microsoft Corporation Collusion-resistant watermarking and fingerprinting
US7096364B2 (en) 2001-04-23 2006-08-22 Microsoft Corporation Collusion-resistant watermarking and fingerprinting
US7058812B2 (en) 2001-04-23 2006-06-06 Microsoft Corporation Collusion-resistant watermarking and fingerprinting
US7681039B2 (en) 2001-04-23 2010-03-16 Microsoft Corporation Collusion-resistant watermarking and fingerprinting
US7062653B2 (en) 2001-04-23 2006-06-13 Microsoft Corporation Collusion-resistant watermarking and fingerprinting
US7558959B2 (en) 2001-04-23 2009-07-07 Microsoft Corporation Collusion-resistant watermarking and fingerprinting
US7359907B2 (en) 2001-11-26 2008-04-15 Microsoft Corporation Extending a directory schema independent of schema modification
US7536414B2 (en) 2001-11-26 2009-05-19 Microsoft Corporation Dynamically generated schema representing multiple hierarchies of inter-object relationships
US7487176B2 (en) 2001-11-26 2009-02-03 Microsoft Corporation Extending a directory schema independent of schema modification
US7389335B2 (en) 2001-11-26 2008-06-17 Microsoft Corporation Workflow management based on an integrated view of resource identity
US7246136B2 (en) 2001-11-26 2007-07-17 Microsoft Corporation Dynamically generated schema representing multiple hierarchies of inter-object relationships

Also Published As

Publication number Publication date
EP0888676A1 (en) 1999-01-07
AU2076097A (en) 1997-10-01

Similar Documents

Publication Publication Date Title
US5664018A (en) Watermarking process resilient to collusion attacks
US5949885A (en) Method for protecting content using watermarking
Celik et al. Hierarchical watermarking for secure image authentication with localization
US6272634B1 (en) Digital watermarking to resolve multiple claims of ownership
Fridrich Methods for tamper detection in digital images
Memon et al. Protecting digital media content
Rey et al. A survey of watermarking algorithms for image authentication
Wolfgang et al. A watermarking technique for digital imagery: further studies
Cox et al. A secure, robust watermark for multimedia
Liu et al. A review study on digital watermarking
JP2002511201A (en) Signal authentication using watermarks
WO2000004422A2 (en) Method for image processing to facilitate copy protection
US8131007B2 (en) Watermarking using multiple watermarks and keys, including keys dependent on the host signal
EP0888676A1 (en) Watermarking process resilient to collusion attacks
Piva et al. Self recovery authentication of images in the DWT domain
Mishra et al. A survey on digital watermarking techniques
Craver et al. Security analysis of public key watermarking schemes
Ahuja et al. A survey of digital watermarking scheme
Mahmoud et al. Frequency domain watermarking: An overview.
Johnson et al. A role for digital watermarking in electronic commerce
Yeung et al. Digital watermarks: Shedding light on the invisible
Piva et al. A watermarking technique for the protection of digital images IPR
Abdelrahman Mohamed Mostafa Overview and Classification of Digital Watermarking Algorithms
Jia et al. Digital watermark-based security technology for geo-spatial graphics data
Vana Digital Watermarking for color images using wavelet transform

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AU CA JP US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 1997909004

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: JP

Ref document number: 97532771

Format of ref document f/p: F

WWP Wipo information: published in national office

Ref document number: 1997909004

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: CA

WWW Wipo information: withdrawn in national office

Ref document number: 1997909004

Country of ref document: EP