WO2003075272A2 - Double watermarks - Google Patents

Double watermarks Download PDF

Info

Publication number
WO2003075272A2
WO2003075272A2 PCT/IB2003/000493 IB0300493W WO03075272A2 WO 2003075272 A2 WO2003075272 A2 WO 2003075272A2 IB 0300493 W IB0300493 W IB 0300493W WO 03075272 A2 WO03075272 A2 WO 03075272A2
Authority
WO
WIPO (PCT)
Prior art keywords
watermark
robust
watermarks
detecting
signal
Prior art date
Application number
PCT/IB2003/000493
Other languages
French (fr)
Other versions
WO2003075272A3 (en
Inventor
Arnoldus W. J. Oomen
Menno A. Treffers
Original Assignee
Koninklijke Philips Electronics N.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics N.V. filed Critical Koninklijke Philips Electronics N.V.
Priority to AU2003202778A priority Critical patent/AU2003202778A1/en
Publication of WO2003075272A2 publication Critical patent/WO2003075272A2/en
Publication of WO2003075272A3 publication Critical patent/WO2003075272A3/en

Links

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00884Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a watermark, i.e. a barely perceptible transformation of the original data which can nevertheless be recognised by an algorithm
    • G11B20/00905Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a watermark, i.e. a barely perceptible transformation of the original data which can nevertheless be recognised by an algorithm multiple watermarks used in combination
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy

Definitions

  • the present invention relates to a method and apparatus for processing watermarks in a signal.
  • the invention also relates to a signal.
  • Watermarks are perceptually invisible messages embedded in the content of signals of audio and video. Watermarks can support a wide variety of applications such as monitoring and copy control.
  • a watermark can be used to embed copy protection information in a signal.
  • a compromise needs to be made for instance between detection time, detection complexity, robustness and content quality deterioration.
  • a robust watermark is very resistant against attacks, but is able to carry only a small amount of payload.
  • a fragile watermark on the other hand, is able to carry a higher payload than the robust watermark, but is only resistant to mild attacks. Therefore, a combination of a robust watermark and a fragile watermark is a common combination.
  • the high robustness of the robust watermark is used along with the high payload that can be carried by the fragile watermark since the latter does not require redundancy. In the case the fragile watermark has been removed, there is still the robust watermark to detect that a fragile watermark should have been present.
  • An object of the invention is to provide a method for embedding watermarks in a signal, which method solves the problem stated above.
  • this is realized in a method for embedding watermarks in a signal, whereby multiple robust watermarks are provided.
  • a first robust watermark is added to the signal, which watermark is robust against a limited set of signal processing that can be expected by a "friendly user" under normal conditions and a second higher complexity watermark is also added to the signal, which watermark is robust against all kinds of malicious attacks.
  • the term "higher complexity” means that an additional watermark is more complex or has a longer timing algorithm than the first watermark that is searched for.
  • the second watermark is searched for and found indicating that the first watermark should have been present.
  • all at least two robust watermarks are embedded simultaneously.
  • one or more watermarks can be embedded time-multiplexed.
  • adding said at least second watermark comprises watermarks being robust against operations such as mp3 encoding/decoding, D/A and A/D conversion, equalization and (modest) speed-control.
  • an apparatus for detecting a watermark signal embedded in an information signal comprising:
  • the first detector searches for a first robust watermark during a limited detection time, or with a limited detection complexity, and if not found the second watermark detector searches for the second watermark during a detection time that is longer or with a detection complexity that is higher than in the first detector.
  • Both detectors can also be combined in one detector.
  • a multimedia playing and/or recording apparatus comprising an apparatus for detecting a watermark signal embedded in an information signal, comprising:
  • the first detector searches for a first robust watermark during a limited detection time, or with a limited detection complexity, and if not found the second watermark detector searches for the second watermark during a detection time that is longer or with a detection complexity that is higher than in the first detector.
  • a signal comprising at least a first watermark being robust against a limited set of processing attacks that can be expected under normal conditions by friendly users, and at least a second watermark being robust against all kinds of malicious attacks.
  • a watermark For a watermark to be effective in ownership applications, it is essential that it remains embedded and detectable in the content in which it is inserted. This is accomplished by the invention.
  • FIG. 1 shows a method according a preferred embodiment of the invention, whereby a first and a second watermark are detected in an audio signal.
  • FIG. 2 shows an apparatus according to a preferred embodiment of the invention.
  • multiple robust watermarks are embedded, at least one being robust against a limited set of processing attacks that can be expected under normal conditions by friendly users, the other against all kinds of malicious attacks.
  • the processing attacks could comprise operations such as mp3 encoding/decoding,
  • Embedding of watermarks in audio can generally be described by a formula
  • X is a frequency domain representation of the original audio.
  • Y is a frequency domain representation of the watermarkeid audio.
  • W is a frequency domain representation of a secret noise-like watermarked pattern.
  • is a global scaling parameter to control the strength of the watermark.
  • This embedding algorithm comprises adding a scaled version of W to an original audio X.
  • a watermark as described above is simply additive noise.
  • the samples of the watermark pattern can for instance be drawn from a normal distribution N(0, 1) with mean and standard deviation equal to 0 and 1, respectively, or they can also be floating point values, or integer based. Samples of the watermark pattern can also be obtained in any other suitable way.
  • a method for embedding watermarks in a signal comprises the following steps:
  • Adding' each watermark, the first wl, and the second w2 could be done for instance using a method known per-se, such as the one described above.
  • More watermarks than two could of course be implemented if required.
  • multiple watermarks of similar types it can be advantageous to apply all watermarks simultaneously or alternatively one or more watermarks can be embedded time-multiplexed. If fragile watermarks are to be simultaneously embedded, it is preferred, or in some cases even necessary to embed them after embedding the robust watermarks to not destroy them.
  • a method according a preferred embodiment of the invention whereby a first and a second watermark wl and w2 are detected in an incoming audio signal Qin is shown.
  • two robust watermarks wl and w2 are embedded in an audio signal, for instance from a CD that is played.
  • An incoming signal Qin comprising a first watermark wl and a second watermark w2 is searched for detection of the "simple" robust first watermark wl in a first step 1. If the first watermark wl is found, it is labelled as being present in a second step 2. In a third step 3, copyright management is applied.
  • a fourth step 4 is performed for detection of the second watermark w2. If this second watermark w2 is detected, it is labelled as "present” and transferred to step 2, whereby the third step 3 is performed as for the first watermark wl .
  • the second complex watermark w2 is not detected in the fourth step 4, the content copy is considered to be free from watermarks, step 5. Thereafter, copyright management is applied in step 3 as for the first watermark wl.
  • the apparatus 10 for detecting watermarks in a signal comprises a first low complex watermark detector 11 and a second higher complex watermark detector 12. Typically, both detectors are implemented in consumer electronic equipment such as CD- apparatus.
  • the first detector 11 performs initial detection for a robust low complex watermark wl and if this fails, i. e. no watermark is found, the signal Qin is transmitted to the second detector 12, which performs detection for a second robust higher complex watermark w2.
  • the second detector 12 is designed not to be complex but having a long detection time > Td.
  • the detection time Td is defined as the detection time in the first detector 11.
  • the watermarks can be detected using any suitable type of conventional method such as the one described below.

Abstract

A method, apparatus and signal for combining two robust watermarks, whereby a low complexity watermark is searched for first, and if not found, a second higher complexity watermark is searched for. The low complexity watermark is robust against a limited set of signal processing that can be expected by a 'friendly user' under normal conditions. The second higher complexity watermark is robust against all kinds of malicious attacks.

Description

Double watermarks
FIELD OF THE INVENTION
The present invention relates to a method and apparatus for processing watermarks in a signal. The invention also relates to a signal.
BACKGROUND OF THE INVENTION
Watermarks are perceptually invisible messages embedded in the content of signals of audio and video. Watermarks can support a wide variety of applications such as monitoring and copy control.
A watermark can be used to embed copy protection information in a signal. In the choice for the watermark, a compromise needs to be made for instance between detection time, detection complexity, robustness and content quality deterioration.
For copy protection of audio signals, two types of watermarks can be employed, a robust watermark and a fragile watermark. A robust watermark is very resistant against attacks, but is able to carry only a small amount of payload. A fragile watermark on the other hand, is able to carry a higher payload than the robust watermark, but is only resistant to mild attacks. Therefore, a combination of a robust watermark and a fragile watermark is a common combination. The high robustness of the robust watermark is used along with the high payload that can be carried by the fragile watermark since the latter does not require redundancy. In the case the fragile watermark has been removed, there is still the robust watermark to detect that a fragile watermark should have been present.
This is described for instance in "If one watermark is good, are more better", Fred Mintzer and Gordon W. Brandaway, IBM T. J. Watson Research Center, in which the implementation of multiple watermarks is described, of which the watermarks are combinations of different types such as a combination of an ownership watermark that is very robust and a verification watermark that is quite fragile.
Since a robust watermark should be highly robust against all kinds of attacks, the detection of a robust watermark usually implies a high increase in complexity. If the application allows it, generally there can be a trade-off between this increase of complexity and detection time and/or robustness. However, in applications where this trade-off is not possible, e. g. where high robustness and short detection time are required at the same time, the increase in complexity could be a problem.
Thus, there is a need of watermark processing for both video and audio signals that overcomes the problem with being sensitive for attacks, where a robust watermark can be employed in such a way that detection time is short and robustness high without the problem with increased complexity.
OBJECT AND SUMMARY OF THE INVENTION
An object of the invention is to provide a method for embedding watermarks in a signal, which method solves the problem stated above.
According to a principal aspect of the present invention, this is realized in a method for embedding watermarks in a signal, whereby multiple robust watermarks are provided.
According to another aspect of the invention, a first robust watermark is added to the signal, which watermark is robust against a limited set of signal processing that can be expected by a "friendly user" under normal conditions and a second higher complexity watermark is also added to the signal, which watermark is robust against all kinds of malicious attacks. Herein, the term "higher complexity" means that an additional watermark is more complex or has a longer timing algorithm than the first watermark that is searched for.
As a result of these limited robustness requirements, detection complexity and detection time for this first robust watermark can be very low, whereby in many situations, only the first watermark has to be detected.
In some situations where the first watermark was not considered to be present, the second watermark is searched for and found indicating that the first watermark should have been present.
There is provided, in accordance with a preferred embodiment of the invention a method for embedding watermarks in an information signal, wherein the method comprises the following steps:
- adding at least a first watermark being robust against a limited set of processing attacks that can be expected by friendly users under normal conditions,
- adding at least a second watermark being robust against all kinds of malicious attacks.
Preferably, all at least two robust watermarks are embedded simultaneously. Alternatively, one or more watermarks can be embedded time-multiplexed. Preferably, adding said at least second watermark comprises watermarks being robust against operations such as mp3 encoding/decoding, D/A and A/D conversion, equalization and (modest) speed-control.
There is further provided, in accordance with a preferred embodiment of the invention, a method for detecting watermarks embedded in an information signal, wherein the method comprises the following steps:
- providing a watermarked information signal and evaluating said signal for embedded watermarks,
- in a first step detecting if a first watermark is present,
- in a second step detecting if a second watermark is present.
There is further provided an apparatus for detecting a watermark signal embedded in an information signal, comprising:
- at least a first robust watermark detector for detecting if a first watermark is present, and
- at least a second robust watermark detector for detecting if a second watermark is present, whereby the first detector searches for a first robust watermark during a limited detection time, or with a limited detection complexity, and if not found the second watermark detector searches for the second watermark during a detection time that is longer or with a detection complexity that is higher than in the first detector. Both detectors can also be combined in one detector.
According to an embodiment of the invention, there is provided a multimedia playing and/or recording apparatus, comprising an apparatus for detecting a watermark signal embedded in an information signal, comprising:
- at least a first robust watermark detector for detecting if a first watermark is present, and
- at least a second robust watermark detector for detecting if a second watermark is present, whereby the first detector searches for a first robust watermark during a limited detection time, or with a limited detection complexity, and if not found the second watermark detector searches for the second watermark during a detection time that is longer or with a detection complexity that is higher than in the first detector.
According to an embodiment of the invention, there is further provided a signal comprising at least a first watermark being robust against a limited set of processing attacks that can be expected under normal conditions by friendly users, and at least a second watermark being robust against all kinds of malicious attacks. For a watermark to be effective in ownership applications, it is essential that it remains embedded and detectable in the content in which it is inserted. This is accomplished by the invention.
The above described aspects and other aspects of the invention will be apparent from and elucidated with reference to the embodiments(s) described hereinafter.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 shows a method according a preferred embodiment of the invention, whereby a first and a second watermark are detected in an audio signal.
FIG. 2 shows an apparatus according to a preferred embodiment of the invention.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS OF THE INVENTION According to an aspect of the invention, multiple robust watermarks are embedded, at least one being robust against a limited set of processing attacks that can be expected under normal conditions by friendly users, the other against all kinds of malicious attacks. The processing attacks could comprise operations such as mp3 encoding/decoding,
D/A and A/D conversion, equalization and speed-control.
Before describing preferred embodiments of the invention a brief introduction to embedding of watermarks in a signal will be given.
Embedding of watermarks in audio can generally be described by a formula
(I):
Y=X+αXW (I)
in which:
X is a frequency domain representation of the original audio.
Y is a frequency domain representation of the watermarkeid audio.
W is a frequency domain representation of a secret noise-like watermarked pattern. α is a global scaling parameter to control the strength of the watermark.
This embedding algorithm comprises adding a scaled version of W to an original audio X. In other words, a watermark as described above is simply additive noise. The samples of the watermark pattern can for instance be drawn from a normal distribution N(0, 1) with mean and standard deviation equal to 0 and 1, respectively, or they can also be floating point values, or integer based. Samples of the watermark pattern can also be obtained in any other suitable way.
Other embedding techniques without scaling parameters for instance are also possible, but will not be further described since they are well known for a person within this technical field.
According to a preferred embodiment of the invention, a method for embedding watermarks in a signal is provided. The method comprises the following steps:
- adding a first watermark wl being robust against a limited set of processing attacks that can be expected by under normal conditions by friendly users,
- adding a second watermark w2 being robust against all kinds of malicious attacks.
Adding' each watermark, the first wl, and the second w2, could be done for instance using a method known per-se, such as the one described above.
More watermarks than two could of course be implemented if required. In the case where multiple watermarks of similar types are embedded, it can be advantageous to apply all watermarks simultaneously or alternatively one or more watermarks can be embedded time-multiplexed. If fragile watermarks are to be simultaneously embedded, it is preferred, or in some cases even necessary to embed them after embedding the robust watermarks to not destroy them.
In Fig. 1 a method according a preferred embodiment of the invention, whereby a first and a second watermark wl and w2 are detected in an incoming audio signal Qin is shown. In this example of an embodiment of the invention, two robust watermarks wl and w2 are embedded in an audio signal, for instance from a CD that is played. An incoming signal Qin comprising a first watermark wl and a second watermark w2 is searched for detection of the "simple" robust first watermark wl in a first step 1. If the first watermark wl is found, it is labelled as being present in a second step 2. In a third step 3, copyright management is applied.
If, on the contrary, in the first step 1, the first watermark wl is not found, a fourth step 4 is performed for detection of the second watermark w2. If this second watermark w2 is detected, it is labelled as "present" and transferred to step 2, whereby the third step 3 is performed as for the first watermark wl .
If, the second complex watermark w2 is not detected in the fourth step 4, the content copy is considered to be free from watermarks, step 5. Thereafter, copyright management is applied in step 3 as for the first watermark wl. In Fig, 2 an apparatus 10 for performing the method according to the invention is shown. The apparatus 10 for detecting watermarks in a signal comprises a first low complex watermark detector 11 and a second higher complex watermark detector 12. Typically, both detectors are implemented in consumer electronic equipment such as CD- apparatus.
The first detector 11 performs initial detection for a robust low complex watermark wl and if this fails, i. e. no watermark is found, the signal Qin is transmitted to the second detector 12, which performs detection for a second robust higher complex watermark w2.
Preferably, the second detector 12 is designed not to be complex but having a long detection time > Td. The detection time Td is defined as the detection time in the first detector 11.
Now a general description of a detection algorithm will follow. The watermarks can be detected using any suitable type of conventional method such as the one described below.
Detection of watermarks in signals according to prior art:
{ Start of watermark detection }
{ Start of phase 1: accumulation of data r
Input signal Z = 0
For a number n of partly overlapping frames the method steps are:
1 : load a frame ( e. g. 2048 samples) - y
2:decorrelate y (e. g. by convolving with < -1, 2, -1 -> Λy
3: apply a window (e. g. Hanning) and transform to a frequency domain - Y = F(y)
4 accumulate magnitudes only where Z = Z+ 1 Y |
"{ end of phase 1
{ start of phase 2 "correlation for detection" \
1 : the SPOMF-method is used
→ C = F1(P(F(Z)).P(F(W)*)) with proper windows applied, and where P is:
P(X) = x / |x| if x ≠ 0, and P(0) = 1
2: normalize the standard deviation of C and look for maximum p - p = max (C/σc)
3: watermark is most likely to be present if p exceeds certain threshold T(e. g. T=5,5)
\ end of phase 2 \
\ end of watermark detection r
As used in the following claims, the words "comprise" or "include" or their conjunctions means "including, but not necessarily limited to.

Claims

CLAIMS:
1. A method for embedding a watermark in an information signal, said method comprising the steps of:
- adding at least a first watermark (wl) being robust against a limited set of processing attacks that can be expected under normal conditions by friendly users,
- adding at least a second watermark (w2) being robust against all kinds of malicious attacks.
2. A method according to claim 1, wherein all at least two robust watermarks are embedded simultaneously.
3. A method according to claim 1, wherein all at least two robust watermarks are embedded time-multiplexed.
4. A method according to any of the claims 1 or 2, wherein adding said at least second watermark comprises watermarks being robust against operations such as mp3 encoding/decoding, D/A and A/D conversion, equalization and speed-control.
5. A method for detecting watermarks embedded in an information signal, said method comprising the steps of:
- providing a watermarked information signal and evaluating said signal for embedded watermarks,
- in a first step (1) detecting if a first watermark (wl) is present,
- in a following step detecting if a second watermark (w2) is present.
6. A method according to claim 5, further comprising the step of detecting during a long period of time in the second step.
7. Apparatus (10) for detecting a watermark signal embedded in an information signal, comprising: - at least a first robust watermark detector (11) for detecting if a first watermark (wl) is present, and
- at least a second robust watermark detector (12) for detecting if a second watermark (w2) is present, whereby the first detector (11) searches for a first robust watermark (wl) during a limited detection time (Td), and if not found the second watermark detector searches for the second watermark (w2) during a detection time (Td) that is longer than in the first detector.
8. A multimedia playing and/or recording apparatus, comprising an apparatus (10) according to claim 7.
9. A signal comprising at least a first watermark (wl) being robust against a limited set of processing attacks that can be expected under normal conditions by friendly users, and at least a second watermark (w2) being robust against all kinds of malicious attacks.
PCT/IB2003/000493 2002-03-06 2003-02-07 Double watermarks WO2003075272A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2003202778A AU2003202778A1 (en) 2002-03-06 2003-02-07 Double watermarks

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP02075864.5 2002-03-06
EP02075864 2002-03-06

Publications (2)

Publication Number Publication Date
WO2003075272A2 true WO2003075272A2 (en) 2003-09-12
WO2003075272A3 WO2003075272A3 (en) 2003-12-04

Family

ID=27771896

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2003/000493 WO2003075272A2 (en) 2002-03-06 2003-02-07 Double watermarks

Country Status (2)

Country Link
AU (1) AU2003202778A1 (en)
WO (1) WO2003075272A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7587603B2 (en) 2000-02-07 2009-09-08 Koninklijke Philips Electronics N.V. Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999053428A1 (en) * 1998-04-16 1999-10-21 Digimarc Corporation Digital watermarking and banknotes
WO2001057869A2 (en) * 2000-02-01 2001-08-09 Koninklijke Philips Electronics N.V. Protecting content from illicit reproduction by proof of existence of a complete data set
WO2001059705A2 (en) * 2000-02-07 2001-08-16 Koninklijke Philips Electronics N.V. Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections
US20010024510A1 (en) * 2000-02-29 2001-09-27 Keiichi Iwamura Digital content processing method
WO2001080169A1 (en) * 2000-04-17 2001-10-25 Digimarc Corporation Authentication of physical and electronic media objects using digital watermarks
US6345104B1 (en) * 1994-03-17 2002-02-05 Digimarc Corporation Digital watermarks and methods for security documents
US20020178368A1 (en) * 2001-05-24 2002-11-28 Peng Yin Semi-fragile watermarking system for MPEG video authentication

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6345104B1 (en) * 1994-03-17 2002-02-05 Digimarc Corporation Digital watermarks and methods for security documents
WO1999053428A1 (en) * 1998-04-16 1999-10-21 Digimarc Corporation Digital watermarking and banknotes
WO2001057869A2 (en) * 2000-02-01 2001-08-09 Koninklijke Philips Electronics N.V. Protecting content from illicit reproduction by proof of existence of a complete data set
WO2001059705A2 (en) * 2000-02-07 2001-08-16 Koninklijke Philips Electronics N.V. Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections
US20010024510A1 (en) * 2000-02-29 2001-09-27 Keiichi Iwamura Digital content processing method
WO2001080169A1 (en) * 2000-04-17 2001-10-25 Digimarc Corporation Authentication of physical and electronic media objects using digital watermarks
US20020178368A1 (en) * 2001-05-24 2002-11-28 Peng Yin Semi-fragile watermarking system for MPEG video authentication

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
"SDMI SECURE DIGITAL MUSIC INITIATIVE" SDMI PORTABLE DEVICE SPECIFICATION VERSION 1.0, XX, XX, no. PART 1, 8 July 1999 (1999-07-08), pages 1-35, XP000997330 *
DATABASE INSPEC [Online] THE INSTITUTION OF ELECTRICAL ENGINEERS, STEVENAGE, GB May 2001 HUA XIANSHENG ET AL: 'To embed multiple watermarks simultaneously', XP002253046 Database accession no. 6978544 & ACTA SCIENTIARUM NATURALIUM UNIVERSITATIS PEKINENSIS, vol. 37, no. 3, May 2001 (2001-05), pages 305-314, Acta Sci. Nat. Univ. Pekin. (China), Acta Scientiarum Naturalium Universitatis Pekinensis, May 2001, Peking University Press, China ISSN: 0479-8023 *
MINTZER F ET AL: "IF ONE WATERMARK IS GOOD, ARE MORE BETTER?" 1999 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING. PHOENIX, AZ, MARCH 15 - 19, 1999, IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING (ICASSP), NEW YORK, NY : IEEE, US, vol. VOL. 6, 1999, pages 2067-2069, XP000974584 ISBN: 0-7803-5042-1 cited in the application *
SDMI: "Amendment 1 to SDMI Portable Device Specification, Part I, Version 1.0"[Online] 23 September 1999 (1999-09-23), XP002253048 BROOKLYN Retrieved from the Internet: <URL:http://www.sdmi.org/download/port_device_spec_amend1.pdf> [retrieved on 2003-08-25] *
SDMI: "Amendment 2 to SDMI Portable Device Specification, Part I, Version 1.0"[Online] 13 October 2000 (2000-10-13), XP002253047 LOS ANGELES Retrieved from the Internet: <URL:http://www.sdmi.org/download/port_device_spec_amend2.pdf> [retrieved on 2003-08-25] *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7587603B2 (en) 2000-02-07 2009-09-08 Koninklijke Philips Electronics N.V. Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections

Also Published As

Publication number Publication date
WO2003075272A3 (en) 2003-12-04
AU2003202778A1 (en) 2003-09-16

Similar Documents

Publication Publication Date Title
Kalker Considerations on watermarking security
US7478242B2 (en) Increasing integrity of watermarks using robust features
EP1256086B1 (en) Methods and apparatus for multi-layer data hiding
US6430301B1 (en) Formation and analysis of signals with common and transaction watermarks
US8346567B2 (en) Efficient and secure forensic marking in compressed domain
EP0941605B1 (en) Method and arrangement for detecting a watermark
US20020078359A1 (en) Apparatus for embedding and detecting watermark and method thereof
Kirovski et al. Spread-spectrum audio watermarking: requirements, applications, and limitations
JP2007528017A (en) Digital watermark embedding and detection
EP1510075B1 (en) Method of extracting a watermark
Ansari et al. Data-hiding in audio using frequency-selective phase alteration
WO2005027517A1 (en) Methods and apparatus for tamper detection in watermarking systems
JP2005518694A (en) Digital watermark strong against collusion
WO2003075272A2 (en) Double watermarks
Xu et al. Digital audio watermarking and its application in multimedia database
Xu et al. A robust digital audio watermarking technique
US8051290B2 (en) Increasing integrity of watermarks using robust features
Xu et al. Digital audio watermarking based-on multiple-bit hopping and human auditory system
Tafreshi et al. Spread spectrum audio watermarking: Enhancement of detection and watermarking capacity
Setyawan et al. Content-dependent spatio-Temporal video watermarking using 3-dimensional discrete cosine transform
KR20060112667A (en) Watermark embedding
Ho et al. A robust spread-spectrum watermarking method using two-level quantization
Vaitheki et al. A Havoc proof for secure and robust audio watermarking
Wong et al. A novel semi-private watermarking technique
Zmudzinski et al. Audio watermarking forensics: detecting malicious re-embedding

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase in:

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP