US006968057B2

(12) United States Patent

(10) Patent N0.:

Rhoads

(54)

US 6,968,057 B2

(45) Date of Patent:

EMULSION PRODUCTS AND IMAGERY

(58)

Nov. 22, 2005

Field of Search .......................... .. 380/54, 59, 232,

EMPLOYING STEGANOGRAPHY

382/232

(56)

(75) Inventor: Geo?'rey B. Rhoads, West Linn, OR

References Cited

(Us)

U.S. PATENT DOCUMENTS

(73) Assignee: DIGIMARC Corporation, Beaverton,

3,493,674 A 3,569,619 A

OR (US) (*)

Notice:

(Continued)

Subject to any disclaimer, the term of this patent is extended or adjusted under 35

FOREIGN PATENT DOCUMENTS

U.S.C. 154(b) by 596 days. DE EP

(21) Appl. No.: 10/102,026 (22) Filed: (65)

3806411 058 482

9/1989 8/1982

(Continued)

Mar. 19, 2002

OTHER PUBLICATIONS

Prior Publication Data

“Access Control and COpyright Protection for Images,

US 2002/0164049 A1 Nov. 7, 2002

Conditional Access and Copyright Protection Based on the

Use of Trusted Third Parties,” 1995, 43 pages. “Access Control and COpyright Protection for Images,

Related US. Application Data (63)

2/ 1970 Houghton

3/1971 Simjian

Continuation-in-part of application No. 09/640,806, ?led on Aug. 17, 2000, now Pat. No. 6,438,231, which is a continu ation of application No. 09/169,088, ?led on Oct. 8, 1998, now Pat. No. 6,111,954, which is a continuation of appli cation No. 08/637,531, ?led on Apr. 25, 1996, now Pat. No.

5,822,436, which is a continuation-in-part of application No. 08/534,005, ?led on Sep. 25, 1995, now Pat. No. 5,832,119, which is a continuation-in-part of application No. 08/438, 159, ?led on May 8, 1995, now Pat. No. 5,850,481, which is a continuation-in-part of application No. 08/327,426, ?led on Oct. 21, 1994, now Pat. No. 5,768,426, which is a

continuation-in-part of application No. 08/215,289, ?led on Mar. 17, 1994, now abandoned, application No. 10/102,026, which is a continuation-in-part of application No. 08/186, 962, ?led on Nov. 5, 1998, which is a continuation of

application No. 08/649,419, ?led on Apr. 16, 1996, now Pat.

No. 5,862,260. (51)

Int. Cl? ................................................ .. H04L 9/00

(52)

US. Cl. .......................................... ..380/59; 380/54

WorkPackage 8: Watermarking,” Jun. 30, 1995, 46 pages.

(Continued) Primary Examiner—Salvatore Cangialosi (74) Attorney, Agent, or Firm—Digimarc Corporation (57) ABSTRACT Images are steganographically marked with codes that can be used, e.g., by reference to a remote registry, to identify the

image proprietors. Some embodiments pre-mark blank emulsion ?lm or paper products with such codes, so that images formed thereon can be traced back to their propri etors. A variety of other embodiments and technologies are also disclosed.

4 Claims, 28 Drawing Sheets

OBTAIN OR CREATE ORIGINAL

DIGITAL SIGNAL OR IMAGE ESTIMATE ROUGH OFFSET

AND RMS NOISE CHOOSE N OR N-BIT

IDENTIFICATION WORD. E6. 32 GENERATE N-BIT IDENTIFICATION WORD GENERATE OR SYNTHESIZE N ‘RANDOM’ INDEPENDENT SIGNALS WITH ROUGHLY GAUSSIAN DISTRIBUTION ABOUT SOME MEAN VALUE, WHERE SIGNALS HAVE EQUAL EXTENT AND DIGITAL SPACING OF ORIGINAL DIGITAL SIGNAL OR IMAGE

APPLY DIGITAL FILTER WHICH ATTENUATES BOTH LOW AND HIGH FREQUENCIES. LEAVING

MIDDLE-RANGE FREQUENCIES LARGELY INTACT CONDENSE N RANDOM SIGNALS TO A LOWEST ACCEPTABLE BIT VALUE IF MEMORY OR STORAGE SPACE IS ATA PREMIUM

[ADDIN THEIR ALL RANDOM IMAGES TOGETHER WHICH HAVE A CURRESFONDING “U ASSOCIATED BIT
EXPERIMENT VISUALLY WITH GAIN AND GAMMA APPLIED TO BASE COMPOSITE SIGNAL 0R IMAGE, ADDING THIS TO ORIGINAL DIGITAL SIGNAL 0R IMAGE, AND DETERMINING THE ACCEPTABLE PERCEIVED NOISE LEVEL

LAPF'LY FOUND GAIN AND CAMMA TO BASE COMPOSITE‘ ADD TO ORIGINAL, J THEN CALL THIS THE DISTRIBUTABLE SIGNAL OR IMAGE

LSTORE AWAYAND SECURE ORIGINAL SIGNAL OR IMAGE, ALONG WITH N-BIT IDENTIFICATION WORD AND THEN RANDOM SIGNALS

SELL OR DISTRIBUTE THE DISTRIBUTABLE SIGNAL OR IMAGE

US 6,968,057 B2 Page 2

US. PATENT DOCUMENTS

3,576,369 3,585,290 3,655,162 3,703,628 3,805,238 3,809,806 3,838,444 3,914,877 3,922,074 3,971,917 3,977,785 3,982,064 3,984,624 4,025,851 4,184,700 4,212,673 4,225,967 4,227,784 4,230,990 4,231,113 4,238,849 4,252,995 4,262,329 4,264,169 4,313,197 4,349,257 4,352,555 4,367,488 4,379,947 4,380,027 4,389,671 4,395,600 4,416,001 4,423,415 4,425,642 4,476,468 4,528,588 4,532,508 4,547,804 4,553,261 4,590,366 4,595,950 4,600,221 4,637,051 4,639,779 4,647,974 4,654,867 4,663,518 4,665,431 4,672,605 4,675,746 4,677,435 4,682,794 4,703,476 4,712,103 4,718,106 4,723,149 4,739,377 4,750,173 4,765,656 4,775,901 4,776,013 4,780,397 4,805,020 4,807,031 4,811,357 4,811,408 4,820,912 4,835,517 4,855,827

4/1971 6/1971 4/1972 11/1972 4/1974 5/1974 9/1974 10/1975 11/1975 7/1976 8/1976 9/1976 10/1976 5/1977 1/1980 7/1980 9/1980 10/1980 10/1980 10/1980 12/1980 2/1981 4/1981 4/1981 1/1982 9/1982 10/1982 1/1983 4/1983 4/1983 6/1983 7/1983 11/1983 12/1983 1/1984 10/1984 7/1985 7/1985 10/1985 11/1985 5/1986 6/1986 7/1986 1/1987 1/1987 3/1987 3/1987 5/1987 5/1987 6/1987 6/1987 6/1987 7/1987 10/1987 12/1987 1/1988 2/1988 4/1988 6/1988 8/1988 10/1988 10/1988 10/1988 2/1989 2/1989 3/1989 3/1989 4/1989 5/1989 8/1989

Wick Sanford Yamamoto et al.

Philipson, Jr.

Rothfjell Walker et al.

Loughlin et al. Hines

Ikegami et al. Maddox et al. Harris

Barnaby Waggener HaselWood et al.

GreenaWay Sethi et al. MiWa et al.

Kipping Lert, Jr. et al.

Blasbalg Gassmann Schmidt et al.

Bright et al.

Harvey MaXemchuk Friedman et al. Dobbs et al. Leventer et al. Warner Leventer et al. Posner et al.

Lundy et al. Ackerman et al. Goldman Moses et al. Goldman

Lofberg Ruell

Greenberg Froessl

Rothfjell Lofberg Bimba Clark

Greenberg Butler et al. LabedZ et al. Borror et al.

Cooper Hustig et al. Tetrick et al.

D’Aggraives et al.

Margolin Howard Gotanda Weinblatt Harada Allen

Bliithgen Becker et al. Nakano Kafri et al.

Tsuchiya Greenberg Broughton et al. Betts et al.

Goldman

Samyn van der Gracht et al.

Best

4,864,618 4,866,771 4,874,936 4,876,617 4,879,747 4,884,139 4,885,632 4,903,301 4,908,836 4,908,873 4,918,484 4,920,503 4,921,278 4,939,615 4,941,150 4,943,973 4,943,976 4,944,036 4,963,998 4,965,827 4,967,273 4,969,041 4,972,471 4,972,475 4,972,476 4,979,210 4,987,431 4,993,068 4,996,530 5,010,405 5,027,401 5,034,982 5,036,513 5,063,446 5,073,899 5,073,925 5,075,773 5,077,608 5,077,795 5,079,648 5,086,469 5,091,966 5,095,196 5,113,437 5,128,525 5,144,649 5,144,660 5,148,498 5,150,409 5,153,919 5,161,210 5,166,676 5,168,146 5,181,786 5,185,736 5,189,453 5,199,081 5,200,822 5,204,902 5,212,551 5,213,337 5,228,056 5,243,423 5,245,165 5,245,329 5,247,364 5,253,078 5,257,199 5,258,998 5,259,025 5,267,334

9/1989 9/1989 10/1989 10/1989 11/1989 11/1989 12/1989 2/1990 3/1990 3/1990 4/1990 4/1990 5/1990 7/1990 7/1990 7/1990 7/1990 7/1990 10/1990 10/1990 10/1990 11/1990 11/1990 11/1990 11/1990 12/1990 1/1991 2/1991 2/1991 4/1991 6/1991 7/1991 7/1991 11/1991 12/1991 12/1991 12/1991 12/1991 12/1991 1/1992 2/1992 2/1992 3/1992 5/1992 7/1992 9/1992 9/1992 9/1992 9/1992 10/1992 11/1992 11/1992 12/1992 1/1993 2/1993 2/1993 3/1993 4/1993 4/1993 5/1993 5/1993 7/1993 9/1993 9/1993 9/1993 9/1993 10/1993 10/1993 11/1993 11/1993 11/1993

Wright et al. Bain Chandler et al. Best et al.

Leighton et al. Pommier

Mabey et al. Kondo et al. Rushforth et al. Philibert et al.

Ujiie et al. Cook

Shiang et al. Brant et al.

IWasaki Werner

Ishigaki Hyatt Maufe McDonald

Greenberg O’Grady et al. Gross et al.

Sant’Anselmo Nathans

Nagata et al.

Harvey Piosenka Hilton Schreiber et al. SoltesZ

Heninger Greenblatt Gibson Collier et al.

Nagata et al. Pullen Dubner Rourke et al. Maufe

Gupta et al. Bloomberg et al.

Miyata Best et al. Stearns et al. Zicker et al. Rose Resnikoff et al.

Elsner Reeds, III et al.

Druyvesteyn et al. Milheiser Marshall et al.

Hujink Tyrrell et al.

Boyd Saito et al. Bron?n et al.

Reeds, III et al. Conanan Sherman

Schilling DeJean et al.

Zhang Gockebay Banker et al. Balkanski et al.

Tsujino et al. Koide Monroe Normille et al.

US 6,968,057 B2 Page 3

5,280,537 5,293,399 5,295,203 5,299,019 5,305,400 5,315,098

A A A A A A 5,319,453 A 5,319,724 A

1/1994 3/1994 3/1994 3/1994 4/1994 5/1994 6/1994 6/1994

28212;: 5,319,735 ’ ’ A

6/1994 7122: 8:12. P161155 61.1 81..1 '

212851233 5,613,004 2 A

3133; 3/1997 Cooperman et 211.

5,335,278 A

8/1994 Matchett et 211.

5,613,012 A

3/1997 Hoffman et a1‘

57337361 A 5,337,362 A

8/1994 Wang?‘ a1~ 8/1994 GOIIIllSh 618.1.

5,614,940 A 5,617,148 A

3/1997 cobb16y 61 81. 4/1997 Montgomery

5,345,595 A

9/1994 Johnson et 211.

5,621,810 A

4/1997 Suzuki et al_

5349655 A

9/1994 Miinn

5,629,770 A

5/1997 Brassil 6161.

5,351,302 5379345 5,387,941 5,388,212 5,394,274

9/1994 Lerghton 618.1. 1/1995 Greenberg Montgomery 618.1. 2/1995 Grube 618.1. 2/1995 Kahn

5,629,980 5,633,952 5,634,012 5,636,292 5,638,443

5/1997 Ste?k et a1_ 5/1997 Outa 61 211. Ste?k et 81' 6/1997 Rhoads 6/1997 $166k 61 81.

A A A A A

Sugiyama et 211. H6111 Krause e1a1, Pack 61 a1_ Butera TOW

5,574,962 5,576,532 5,579,124 5,581,800 5,582,103 5,583,614

A A A A A A

11/1996 11/1996 11/1996 12/1996 12/1996 12/1996

Fardeau et 211. 1166111 Aijala et 81. Fardeau et 81. Tanaka et 211. Hasuo 618.1.

COpriViZa

5,587,743 A

12/1996 Montgomery et 211.

Blonstein 61 81.

5,590,197 A

12/1996 Chen et ‘*1

A A A A A

5,396,559 A

3/1995 MCGICW

5,638,446 A

5398283 A

3/1995 VH8a

5,638,496 A

6/1997 Sato

5,404,160 5,404,377 5,408,542 5,418,853

4/1995 4/1995 4/1995 5/1995

5,640,467 5,646,997 5,659,726 5,661,574

6/1997 7/1997 8/1997 8/1997

A A A A

Schober et @1Moses Callahan Kanota 618.1.

A A A A

5,420,910 A 5,422,963 A

Rudokas 618.1. 6/1995 Che/I} et @1-

5,664,018 A 5,666,487 A

5,422,995 A

6/1995 Aokl et @1-

5,671,277 A

5,425,100 A

Thomas '618.1.

6/1997 Rubin YaIIlaShita 61 81. Barton Sandford, 11 61 211. Kawana

9/1997 Leighton 9/1997 Goodman 61 81. 9/1997 IkeIlOlle 61 81.

5,678,155 A

10/1997 MiyaZa 11/1997 YaInallChi 61 81.

5,428,606 A

6/1995 MOSkOWItZ

5,689,578 A

5,428,607 A

H1l1eretal.

5,710,834 A

1/1998 Rhoads

5,735,547 A 5,745,604 A

4/1998 Morelle et a1' 4/1998 Rhoads ..................... .. 382/232

5,432,542 A 5,432,870 A

7/1995 Thrbadeau et 81. 7/1995 Schwartz

5,446,273 A

8/1995 Lash?

5,771,315 A

6/1998 Matsuya

5,448,760 A

9/1995 Fredenck

5,794,087 A

8/1998 Dobbs 61 81.

5,450,122 A

9/1995 Keene

5,822,436 A

5,450,490 A

9/1995 Jensen et 211.

5,828,777 A

1O/1998 Suzuki

5,454,027 A 5,461,426 A

9/1995 Kennedy 919110/1995 Llmberg 9191-

5,845,008 A 5,847,849 A

12/1998 Katoh 61 81. 12/1998 FllIlada 61 81.

5,463,469 A

10/1995 Funada #1 91-

5,850,481 A

12/1998 Rhoads ..................... .. 382/232

5,465,387 5,469,506 5,473,631 5,479,168 5,481,294

11/1995 11/1995 12/1995 12/1995 1/1996

5,857,038 5,933,520 5,982,891 5,982,956 6,078,682

1/1999 8/1999 11/1999 11/1999 6/2000

A A A A A

Mukheqee Berson Moses Johnson et 211. Thomfis ct a1~

* 10/1998 Rhoads ...................... .. 380/54

A A A A A

Owada 61 211. Ishimoto 61 81. G111161 Lahmi Tanioka 61 81.

5,488,664 5,499,294 A

3/1996 1/1996 Sham“ Fnédfnan

6,438,231 6,111,954 A B1 *

8/2000 8/2002 Rhoads Rhoads.

5,515,081 A

5/1996 vaslllk

6,751,320 B2

6/2004 Rhoads ...................... .. 380/54

5,524,936 A

6/1996 Barr et 211.

5,530,759 A

6/1996 Braudaway et a1.

5,530,772 A

6/1996 Storey

5,530,852 A 5,532,920 A

5,537,223 A 5,539,471 A 5,539,735 A 5,541,662 5,541,741 5,544,255 5,546,146 5,548,646 5,557,333 5,559,559 5,563,717 5,568,179 5,568,268 5,568,570 5,572,010 5,572,247

A A A A A A A A A A A A A

6/1996 7/1996 7/1996 7/1996 7/1996 7/1996 7/1996 8/1996 8/1996 8/1996 9/1996 9/1996 10/1996 10/1996 10/1996 10/1996 11/1996 11/1996

MeSke, Jr. 61 81. 116111161 61 81. Curry Myhwold 61 81. MoskoWitZ Adams 61 81. Suzuki 81111111166 61 81. Dobbs 61 81. AZ1Z 61 81. Jungo 61 81. Jungo 61 81. Koeng 61 81. 13161116161. Tsuji 61 81. 11611116111 P61116 Montgomery et a1.

FOREIGN PATENT DOCUMENTS EP EP EP EP EP EP EP EP EP EP EP GB GB GB GB JP JP WO

411 232 441 702

493 091 551 016 581 317 629 972 649 074 649 114 650 146 766 449 777 197 2063018 2067871 2196167 2204984 4-248771 8-30759 WO89/08915

2/1991 8/1991 7/1992 2/1994 2/1994 12/1994 4/1995 4/1995 4/1995 4/1997 6/1997 5/1981 7/1981 4/1988 11/1988 9/1992 2/1996 9/1989

.. 380/59

US 6,968,057 B2 Page 4

WO WO WO WO WO WO WO

WO91/O1067 WO93/25038 WO95/10835 WO95/14289 WO96/16381 WO96/26494 WO96/27259

1/1991 12/ 1993 4/1995 5/1995 5/1996 8/1996 9/1996

OTHER PUBLICATIONS

“Access Control and COpyright Protection for Images, WorkPackage 1: Access Control and Copyright Protection for Images Need Evaluation,” Jun., 1995, 21 pages.

“Copyright Protection for Digital Images, Digital Finger printing from FBI,” HighWater FBI brochure, 1995, 4 pages.

“Cyphertech Systems: Introduces Digital Encoding Device to Prevent TV Piracy,” Hollywood Reporter; Oct. 20, 1993, p. 23.

“High Water FBI Limited Presentation Image Copyright Protection Software,” FBI Ltd brochure, Jul., 1995, 17 pages.

“Holographic signatures for digital images,” The Seybold

Brassil et al., Electronic Marking and Identi?cation Tech

niques to Discourage Document Copying, Proceedings of INFOCOM ’94 Conference on Computer; IEEE Commun.

Soc Conference, Jun. 12—16, 1994, pp. 1278—1287. Brassil et al., “Hiding Information in Document Images,” Nov., 1995, 7 pages. BroWn, “S—Tools for WindoWs, Version 1.00,.COPYRGT. 1994 Andy BroWn, What is Steganography,” Internet refer ence, Mar. 6, 1994, 6 pages.

BruyndonckX et al., “Spatial Method for Copyright Labeling of Digital Images,” 1994, 6 pages. Burgett et al., “A Novel Method for Copyright Labeling

DigitiZed Image Data,” requested by e—mail from author (unavailable/passWord protected on IGD WWW site); received Sep. 18, 1995, 12 pages.

Caronni, “Assuring OWnership Rights for Digital Images,” Published in the Proceedings of ‘Reliable IT Systems,’ VIS

’95, HH. Briiggemann and W. Gerhardt—Hackl (Ed.),

VieWeg Publishing Company, Germany, 1995, Jun. 14, 1994, 10 pages.

Caruso, “Digital Commerce, 2 plans for Watermarks, Which

Report on Desktop Publishing, Aug. 1995, one page.

can bind proof of authorship to electronic Works,” NeW York

“NAB—Cyphertech Starts Anti—Piracy Broadcast Tests,” Newsbytes, NEW03230023, Mar. 23, 1994. “Steganography,” Intellectual Property and the National Information Infrastructure The Report of the Working Group

Times, Aug. 7, 1995, on page. Castro et al., “Registration of Translated and Rotated Images

on Intellectual Property Rights, Sep. 1995, pp. 212—213. Arachelian, “White Noise Storm,” Apr. 11, 1994, Internet Reference, 13 pages. AraZi, et al., “Intuition, Perception, and Secure Communi cation,” IEEE Transaction Systems, Man, and Cybernetics, vol. 19, No. 5, Sep./Oct. 1989, pp. 1016—1020. Arthur, “Digital Fingerprints Protect Artwork,” New Scien tist, Nov. 12, 1994, p. 24. Aura, “Invisible Communication,” Helskinki University of

Technology, Digital Systems Laboratory, Nov. 5, 1995, 13 pages.

Bartlett, et al., “An OvervieW of HighWater FBI Technol ogy,” Posted on Internet Mar. 22, 1996, 12 pages. Bender et al., “Techniques for Data Hiding,” Draft Preprint, Private Correspondence, dated Oct. 30, 1995. Bender et al., “Techniques for Data Hiding,” Massachusetts Institute of Technology, Media Laboratory, Jan. 1995, 10 pages.

Boland et al., “Watermarking Digital Images for Copyright Protection,” Fifth International Conference on Image Pro

cessing and its Applications, Conference Date Jul. 4—6, 1995, Conf. Publ. No. 410, pp. 326—330.

Boneh, “Collusion—Secure Fingerprinting for Digital Data,” Department of Computer Science, Princeton University,

Using Finite Fourier Transforms,” IEEE Transactions on

Pattern Analysis and Machine Intelligence, vol. PAMI—9, No. 5, Sep. 1987, pp. 700—703.

Chudy, “Handcuffed Digital Thieves,” Byte MagaZine, Apr. 1996, 4 pages. Clarke, “Invisible Code Tags Electronic Images,” Electronic Engineering Times, Jun. 12, 1995, n. 852, p. 42. CoX et al., “A Secure, Imperceptable Yet Perceptually Salient Spread Spectrum Watermark for Multimedia,” IEEE, Southcon/96, Conference Record, pp. 192—197, 1996. CoX et al., “Secure Spread Spectrum Watermarking for Multimedia,” NEC Research Institute Technical Report, Dec. 12, 1995, 33 pages.

DautZenberg, “Watermarking Images,” Department of Microelectronics and Electrical Engineering, Trinity Col lege Dublin, 47 pages, Oct. 1994.

Delaigle et al., “APsychovisual Approach for Digital Picture Watermarking,” 1995, 20 pages. Digimarc presentation at RSA Conference, approximately Jan. 17, 1996, 4 pages. Phil Ebersole, “Kodak Coding Protects Films From Pirates”, Democrat and Chronicle Business, circa 1982—1984.

FitZgerald, “Invisible Digital Copyright ID,” Editor & Pub lisher; Jun. 25, 1994, p. 62. Frequently Asked Questions About Digimarc Signature

Technology, Aug. 1, 1995, http://WWW.digimarc.com, 9

1995, 31 pages.

pages.

Boney et al., “Digital Watermarks for Audio Signals,” EUSIPCO—96, VIII European Signal Proc. Conf., Trieste, Italy, Sep. 1996. Bors et al., “Embedding Parametric Digital Signatures in

Friedman, “The TrustWorthy Digital Camera: Restoring

Images,” EUSIPCO—96, Trieste, Italy, accepted for publica

Hartung et al., Digital Watermarking of RaW and Com pressed Video, 1996, 9 pages.

tion, Sep. 1996 (Published on internet Apr. 9, 1996, (http:// poseidon.csd.auth.gr/papers/confers.1.sub.—ind.html)), 4 pages.

Credibility to the Photographic Image,” IEEE Transactions on Consumer Electronics, vol. 39, No. 4, Nov., 1993, pp. 905—910.

Hecht, “Embedded Data Glyph Technology for Hardcopy Digital Documents,” SPIE vol. 2171, Feb. 1994, pp.

Boucqueau et al., Equitable Conditional Access and Copy

341—352.

right Protection for Image Based on Trusted Third Parties, Teleservices & Multimedia Communications, 2nd Int. Cost 237 Workshop, Second International COST 237 Workshop, Nov. 1995; published 1996, pp. 229—243.

Jain, “Image Coding Via a Nearest Neighbors Image Model,” IEEE Transactions on Communications, vol.

COM—23, No. 3, Mar. 1975, pp. 318—331. Johhnson, “Steganography,” Dec. 10, 1995, 32 pages.

US 6,968,057 B2 Page 5

JPEG Group’s JPEG Software (release 4), ftp.csua.bereke

Pitas et al ., “Applying Signatures on Digital Images,” IEEE

ley.edu/pub/cypherpunks/applications/jsteg/jpeg.announce

Workshop on Nonlinear Image and Signal Processing, Neos Marmaras, Greece, pp. 460—463, Jun., 1995. Pitas, “A Method for Signature Casting on Digital Images,”

ment.gZ, Jun. 7, 1993, 2 pages. Kassam, Signal Detection in Non—Gaussian Noise, DoWden & Culver, 1988, pp. 1—96. Brassil et al., Electronic Marking and Identi?cation Techniques to Discourage Document Copying, Proceedings of INFOCOMM ’94 Conference on Computer, IEEE Commun. Soc Conference, Jun. 12—16, 1994, pp. 1278—1287. Koch et al., “Copyright Protection for Multimedia Data,” Proc. of the International Conference on Digital Media and

Electronic Publishing, Dec. 6—8, 1994, Leeds, UK, 15 pages.

Koch et al., “Digital Copyright Labeling: Providing Evi

1996 IEEE International Conference on Image Processing

(ICIP’96), Lausanne, SWitZerland, accepted for publication, Sep. 16—19, 1996 (Published on internet Apr. 9, 1996,

(http://poseidon.csd.auth.gr/papers/

confers.1.sub.—ind.html)), 4 pages. Port, “Halting HighWay Robbery on the Internet,” Business Week, Oct. 17, 1994, p. 212. Rindfrey, “ToWards an Equitable System for Access Control and Copyright Protection in Broadcast Image Services: The

dence of Misuse and Tracking UnauthoriZed Distribution of

Equicrypt Approach,” Intellectual Property Rights and New

Copyrighted Materials,” Oasis MagaZine, Dec. 1995, 3 Koch et al., “ToWards Robust and Hidden Image Copyright Labeling,” Proc. of 1995 IEEE Workshop on Nonlinear

Technologies, Proc. of the Conference, R. Oldenbourg Ver lag Wien Miinchen 1995, 12 pages. Sandford II, et al., “The Data Embedding Method,” SPIE vol. 2615, Oct. 23, 1995, pp. 226—259.

Signal and Image Processing, Jun. 20—22, 1995, 4 pages. Komatsu et al., “Authentication System Using Concealed

SapWater et al., “Electronic Copyright Protection,” PHOTO>Electronic Imaging, vol. 37, No. 6, 1994, pp.

pages.

Image in Telematics,” Memoirs of the School of Science &

Engineering, Waseda Univ., No. 52, 1988, pp. 45—60. Kurak et al., “A Cautionary Note On Image DoWngrading,” 1992 IEEE, pp. 153—159.

Luc, “Analysis of Spread Spectrum System Parameters for Design of Hidden Transmission,” Radioengineering, vol. 4, No. 2, Jun. 1995, pp. 26—29.

16—21.

[email protected], “Hide and Seek v. 4.0,” Internet

reference, Apr. 10, 1994, 3 pages. Sheng et al., “Experiments on Pattern Recognition Using Invariant Fourier—Mellin Descriptors,” Journal of Optical Society of America, vol. 3, No. 6, Jun., 1986, pp. 771—776.

Machado, “Announcing Stego 1.0a2, The First Steganogra

Short, “Steps Toward Unmasking Secure Communications,”

phy Tool for the Macintosh,” Internet reference, Nov. 28,

International Journal of Bifurcation and Chaos, vol. 4, No. 4, 1994, pp. 959—977. Simmons, “Subliminal Channels; Past and Present,” ET1, vol. 5, No. 4, Jul.—Aug. 1994, pp. 45—59. Sklar, “A Structured OvervieW of Digital Communica

1993, 3 pages.

Macq, “Cryptology for Digital TV Broadcasting,” Proceed ings of the IEEE, vol. 83, No. 6, Jun. 1995 pp. 944—957. Matsui et al., “Video—Steganography: HoW to Secretly Embed a Signature in a Picture,” Ill/[A Intellectual Property

Project Proceedings, Jan. 1994, vol. 1, Issue 1, pp. 187—205. Moller, et al., “RechnergestutZte Steganographie: Wie sie Funktioniert und Warum folglich jede Reglementierung von

tions—a Tutorial RevieW—Part I,” IEEE Communications

MagaZine, Aug., 1983, pp. 1—17. SZepanski, “A signal Theoretic Method for Creating Forg

Verschlusselung unsinnig ist,” DuD, DatenschutZ and Dat ensicherung, Jun. 18, (1994) 318—326.

ery—Proof Documents for Automatic Veri?cation,” Proceed

Nakamura et al., “A Uni?ed Coding Method of Dithered

May 16, 1979, pp. 101—109.

Image and TeXt Data Using Micropatterns,” Electronics and Communications in Japan, Part 1, vol. 72, No. 4, 1999, pp.

Tanaka et al., “A Visual Retrieval System With Private

ings 1979 Carnahan Conference on Crime Countermeasures,

Nakamura et al., “A Uni?ed Coding Method of Image and

Information for Image Database,” Proceedings Interna tional Conference on DSP Applications and Technology, Oct. 1991, 00. 415—421.

Test Data Using Discrete Orthogonal Transform,” Systems

Tanaka et al., “Embedding Secret Information Into a Dith

50—56.

and Computers in Japan, vol. 21, No. 3, 1990, pp. 87—92. Nikolaidis et al., “Copyright Protection of Images Using Robust Digital Signatures,” IEEE International Conference

on Acoustics, Speech and Signal Processing (ICASSP—96), accepted for publication, May 1996 (Published on internet Apr. 9, 1996. Ohnishi et al., Embedding a Seal into a Picture Under

Orthogonal Wavelet Transform, Proceedings of Multimedia ’96, 1996, IEEE, pp. 514—521. ORuanaidh et al, “Watermarking Digital Images for Copy

right Protection,” http://WWW.kalman.mee.tcd.ie/people/jjr/ eva.sub.—pap.html, Feb. 2, 1996, 8 pages. Pennebaker et al., JPEG Still Image Data Compression Standard, Chapter 3, “Aspects of the Human Visual Sys tem,” pp. 23—27, 1993, Van Nostrand Reinhold, NeW York. PickholtZ et al., “Theory of Spread—Spectrum Communica

ered Multi—Level Image,” Proc. IEEE Military Comm.

Conf., Sep. 1990, pp. 216—220. Tanaka et al., “NeW Integrated Coding Schemes for Com puter—Aided Facsimile,” Proc. IEEE Int’l Conf. on Sys.

Integration, Apr. 1990, pp. 275—281. Tirkel et al, “Electronic Water Mark,” DICTA—93, Macqua rie University, Sydney, Australia, Dec., 1993, pp. 666—673. Tirkel et al., “A TWo—Dimensional Digital Watermark,” 1995, 6 pages.

Toga et al., “Registration Revisited,” Journal of Neuro science Methods, 48 (1993), pp. 1—13. Valenti, “Warning! Warner Bros. And Cobra Declare War On

Video Piracy”, Variety, May 28, 1986. van Schyndel et al., “A Digital Watermark,” IEEE Interna

tions—A Tutorial,” Transactions on Communications, vol.

tional Conference on Image Processing, Nov. 13—16, 1994,

COM—30, No. 5, May, 1982, pp. 855—884.

pp. 86—90.

US 6,968,057 B2 Page 6

VoyatZis et al., “Applications of Total Automorphisms in Image Watermarking,” 1996 IEEE International Conference

on Image Processing (ICIP’96), Lausanne, Switzerland, accepted for publication, Sep. 16—19, 1996 (Published on Internet Apr. 9, 1996, (http://poseidon.csd.auth.gr/papers/ confers.1.sub.—ind.html)), 4 pages, 1996 IEEE, Sep. 16—19, 1996, Lausanne, SWitZerland, pp. 237—239. VoyatZis, et al., Chaotic Mixing of Digital Images and Applications to Watermarking, European Conference on

Multimedia

Applications,

Services

and

Techniques

Wagner, “Fingerprinting,” 1993 IEEE, pp. 18—22. Walton, “Image Authentication for a Slippery NeW Age,” Dr. Dobb’s Journal, Apr. 1995, pp. 18—26, 82—87. Weber et al., “Correlative Image Registration,” Seminars in Nuclear Medicine, vol. XXIV, No. 4 (Oct.), 1994, pp. 311—323.

Zhao et al., “Embedding Robust Labels Into Images for Copyright Protection,” Proc. of the International Congress on Intellectual Property Rights for Specialized Information,

(ECMAST’96), Louvain—la—Neuve, Belgium, accepted for

Knowledge and NeW Technologies (Vienna, Austria) Aug.

publication, May 1996 (Published on internet Apr. 9, 1996,

21—25, 1995, 10 pages.

(http://poseidon.csd.auth.gr/papers/ confers.1.sub.—ind.html)), 8 pages.

* cited by examiner

U.S. Patent

Nov. 22,2005

Sheet 1 0f 28

US 6,968,057 B2

12 DSGITAL

NUMBER

,

8

4'B'TS

(SIGNAL LEVEL)

4 0

01234

56

7891011121314

SAMPLE NUMBER (INDEX)

COMPUTER

102

\106

104

[C5

100

WWW/mm

EXPOSE AND STEP

FIG. 4

,

U.S. Patent

Nov. 22,2005

FIG 2

Sheet 2 0f 28

US 6,968,057 B2

OBTAIN OR CREATE ORIGINAL

-

DIGITAL SIGNAL OR IMAGE ESTIMATE ROUGH OFFSET

AND RIVIS NOISE

E

CHOOSE N OR N-BIT

)

IDENTIFICATION WORD, EC. 32 GENERATE N-BIT IDENTIFICATION WORD

GENERATE OR SYNTHESIZE N "RANDOM" INDEPENDENT SIGNALS WITH ROUGHLY GAUSSIAN DISTRIBUTION ABOUT SOME MEAN VALUE, WHERE SIGNALS HAVE EQUAL EXTENT AND DIGITAL SPACING OF ORIGINAL DIGITAL SIGNAL OR IMAGE

APPLY DIGITAL FILTER WHICH ATTENUATES BOTH LOW AND HIGH FREQUENCIES, LEAVING

MIDDLE~RANGE FREQUENCIES LARGELY INTACT CONDENSE N RANDOM SIGNALS TO A LOWEST ACCEPTABLE BIT VALUE IF MEMORY OR STORAGE SPACE IS AT A PREMIUM / ADD ALL RANDOM IMAGES TOGETHER WHICH HAVE A CORRESPONDING "1"

IN THEIR ASSOCIATED BIT-PLACE-VALUE OF THE N-BIT IDENTIFICATION WORD, CALL THIS THE BASE COMPOSITE SIGNAL OR IMAGE K

I EXPERIMENT VISUALLY WITH GAIN AND GAMMA APPLIED TO BASE COMPOSITE SIGNAL OR IMAGE, ADDING THIS TO ORIGINAL DIGITAL SIGNAL

\ OR IMAGE, AND DETERMINING THE ACCEPTABLE PERCEIVED NOISE LEVEL K

L

\_ J

APPLY FOUND GAIN AND CAMMA TO BASE COMPOSITE, ADD TO ORIGINAL,

THEN CALL THIS THE DISTRIBUTABLE SIGNAL OR IMAGE

I

L_ /

KSTORE AWAY AND SECURE ORIGINAL SIGNAL OR IMAGE, ALONG WITH N-BIT y

IDENTIFICATION WORD AND THEN RANDOM SIGNALS

1 (SELL OR DISTRIBUTE THE DISTRIBUTABLE SIGNAL OR IMAGE)

U.S. Patent

Nov. 22,2005

Sheet 3 0f 28

US 6,968,057 B2

OBTAIN DIGITAL OR NON-DIGITAL COPY

OF SUSPECT SIGNAL OR IMAGE

I

FIG. 3

(DIGITIZE IF NOT ALREADY DIGITAL) CUT AND MASK PORTION OF SIGNAL OR

IMAGE BELIEVED TO BE SUSPECT (ONLY IF ENTIRE SIGNAL OR IMAGE IS NOT SUSPECT) PROCURE ORIGINAL DIGITAL SIGNAL OR IMAGE AND CUT AND MASK TO ROUGHLY THE SAME LOCATION OR SEQUENCE

LVISUALLY RESCALE ANDCUT-OUT REGISTERORIGINAL THE CUT-OUT} S USPECT SIGNAL TO THE SIGNA L V

[ SQUARED RUN THROUGH SEARCH PROGRAM WITH MEAN J ERROR AS CRITERIA AND X OFFSET, Y OFFSET, AND SCALE AS THE THREE VARIABLES APPLY X OFFSET, Y OFFSET, AND SCALE TO

CUT-OUT SUSPECT, THEN RESAMPLE ONTO EXACT GRID AND CUT-OUT OF ORIGINAL SIGNAL

I RUN THROUGH SEARCH PROGRAM WITH MEAN SQUARED ERROR AS CRITERIA AND DC OFFSET, GAIN, AND GAMMA

AS THE THREE VARIABLES; APPLY TO SUSPECT SUBTRACT ORIGINAL FROM SUSPECT, GIVING DIFFERENCE SIGNAL OR IMAGE STEP THROUGH ALL N RANDOM INDEPENDENT SIGNALS, MASKED AS ORIGINAL AND CROSS-CORRELATED WITH DIFFERENCE SIGNAL IN IMMEDIATE NEIGHBORHOOD OF REGISTRATION POINTS

[FIND 0 AND 1 LEVEL BY AVERAGING FIRST FOUR 0101 CODE VALUES) ASSIGN EITHER A 0 OR A I TO EACH CROSS-CORRELATION RESULT DEPENDING ON PROXIMITY TO THE AVERAGES OF PREVIOUS STEP

Q CHECK RESULT AGAINST SECURED IDENTIFICATION NUMBER ) PROSECUTE IF IT MATCHES’? OR AT LEAST SEND A NASTY LETTER DEMANDING RECOMPENSE

U.S. Patent

Nov. 22,2005

Sheet 4 0f 28

CODE WORD

(e,g. 01101001

R EA L I: M E ENCODER

INPUT SIGNAL

US 6,968,057 B2

IDENTIFICATION-CODED OUTPUT SIGNAL KEY DATA

(OPTIONAL)

FIG .

5

214

ADDER

SUBTRACTER

0 UTl DI U TI

U.S. Patent

Nov. 22,2005

Sheet 5 0f 28

US 6,968,057 B2

NOISE SOURCE 206

CODE1

CODEZ-N

242

REAL TIME

INPUT

ENCODER

OUTPUT 234 00100000

00100001 00100010 001 0001 1 I

00100101

. Q

7

1ST

NTHCODE WORDS

001001 1 0



001001 1 1

L

0101 1000

-

001 00000 00 1 00001 00 1 00010 00 1 0001 1

SYNC DETECTOR

00100100 INCREMENT

250

FIG. 8

U.S. Patent

Nov. 22, 2005

US 6,968,057 B2

Sheet 6 0f 28

ILME 0 0

1.0

SECONDS

G' 9

SECONDS

NORMALIZED * 402

FREQUENCY

_

20dB

__L__

-40dB w

I OHZ

50KHZ

'

BORDER

OONTINuITY

404

1.0

0.0

——>

~>

A

‘\JUAU

REPEATED

j\\f\\.

W

DETAIL OF MATCH AT BORDER; CONTINUOUS TO mth DERIvITIvE

ROM; 504 STANDARD NOISE SIGNATURES COPYRIGHT AUDIO

DETECTION FLAG ‘

IN

'

—R—’ 500

K 502 FLAG VALID

K 506

508

U.S. Patent

Nov. 22,2005

Sheet 7 0f 28

US 6,968,057 B2

STANDARD NOISE

SIGNATURE READ OUT AT‘I25%

599 \‘

NORMAL RATE PITCH CHANGED NOISE SIGNAL

INPUT AUDIO SIGNAL

a SIGNAL-PITCH CANCELLED NOISE SIGNAL

608

TIME AVERAGED POWER SIGNAL P.C. NOISE sIGNAL PS PCN

TIME AVERAGED POWER SIGNAL

610

'

P

V S'G_ __ _

612

POWER DIFFERENCE sIGNAL

602

613

PS-PCN ‘ PsIG ' POuT

I WW I- —CAsE 1: |-——1—;—I—

|G14/

08

58

I08

I58

58

10s

158

I L— —CAsE 2;

616

08

~ 4 SECOND BEATS

\~ 618

624

F|G - 1 2

AUDIO VALID

COUNTER

FLAG vALID_/50s S'GNAL

sIGNAL ONE

= \__g HDEEEEQTION}

.05S DIGITAL DELAY

>

jg \

620

.05S DIGITAL DELAY

W \

.05S DIGITAL DELAY

[

T [

l

1

.05s DIGITAL DELAY

DETECTION I

K 502

U.S. Patent

Nov. 22,2005

Sheet 8 0f28

US 6,968,057 B2

MOVIE: BUD'S ADVENTURES

700

Alien Productions

FRAME#: 12183 DISTRIBUTION LOT: REGION 14

ENCRYPTION/SCRAMBLING ROUTINE #28, 702

704

PSEUDO-RANDOM MASTER SNOWY IMAGE (SCALED DOWN AND ADDED TO FRAME 12 183)

FIG. 13

U.S. Patent

Nov. 22, 2005

Sheet 9 0f 28

US 6,968,057 B2

EMBEDDED

720 \‘

4/

DIFFERENCE \

I

MEAN-REMOVED HISTOGRAMS OF DIFFERENCE SIGNAL AND KNOWN EMBEDDED CODE SIGNAL

EMBEDDED

722 \‘

DIFFERENCE \‘ I

I

‘A THRESHOLDING MEAN-REMOVED HISTOGRAMS OF FIRST DERIVATIVES (OR SCALER GRADIENTS IN CASE OF AN

IMAGE)

FIG. 14

U.S. Patent

Nov. 22,2005

Sheet 10 0f 28

US 6,968,057 B2

750

I

\

700 RENDER LOGO FRAME

‘I ‘

702 ENCRYPT/SCRAMBLE

l \

704 OUTPUT MASTER SNOWY IMAGE FRAME 752

HIGH BRIGHTNESS MASTER swowv MOVlE 754

760

\

‘CHEAP MASTER SNOWY MOVIE‘

756 COMPRESSED MASTER

SNOWY MOVIE

770

/

762

i 762

U.S. Patent

mow

co\ m\\

.zowr_gvmO0<2.#

Nov. 22,2005

Sheet 11 0f 28

US 6,968,057 B2

U.S. Patent

Nov. 22,2005

Sheet 12 0f 28

96 B? LEADExR STRING, 820 64 BIT LENGTH

32 BIT DATA WORD SIZE

("SHADOW CHANNEL", 828 DATA...

\ 824 UNIVERSAL EMPIRICAL DATA FORMAT

FIG. 17

FIG. 18

US 6,968,057 B2

U.S. Patent

Nov. 22,2005

Sheet 13 0f 28

US 6,968,057 B2

QUEST FOR MOSAICED KNOT PATTERNS WH "COVER" AND ARE COEXTENSIVE WITH OR NAL IMAGE; A LEMENTAL KNOT PATTERNS CAN CON THE S M INFORMATION, SUCH AS STE

GNAT NOGA

, OR EACH CAN CON SENSE

FIG. 19

A NEW MESSAGE IN A

U.S. Patent

Nov. 22,2005

Sheet 14 0f 28

US 6,968,057 B2

874 \ CENTER POINT

/

OF RING, 872 I A

w

|

/\I/\

\]

J‘\

Th v

\/

‘I

\ NOMINAL DISTANCE TO CENTER OF OUTER RING WIDTH, s70

n

w

\/

*

\/

r-\

v"

\ NOMINAL DISTANCE To CENTER OF ouTER RING WIDTH, s70

2-D BRIGHTNESS OF PHASE-ONLY FILTERED RING IS SIMILAR TO THE ABOVE BRIGHTNESS PATTERN ROTATED ABOUT CENTRAL POINT OF RING:

Emulsion products and imagery employing steganography

Nov 22, 2005 - AND DIGITAL SPACING OF ORIGINAL DIGITAL SIGNAL OR IMAGE ..... Bors et al., “Embedding Parametric Digital Signatures in. Images ...

6MB Sizes 2 Downloads 264 Views

Recommend Documents

Video steganography
Jul 11, 2003 - ing, resampling, conversion from digital to analog and back again, etc. ...... 855-884. Pitas et al., “Applying Signatures on Digital Images,” IEEE.

Video steganography
Jul 11, 2003 - Design of Hidden Transmission,” Radioengineering, vol. 4,. No. 2, Jun. .... Communications—a Tutorial RevieW—Part I,” IEEE Com munications .... [ASSIGN EITHER A 0 OR A I TO EACH CROSS-CORRELATION RESULT.

Checklist - Employing People.pdf
Guide to Employing People ... Register for Data Protection or update your existing registration. Provide the new ... Displaying Checklist - Employing People.pdf.

Chemistry and Technology of Emulsion Polymerisation - A. van Herk ...
Chemistry and Technology of Emulsion Polymerisation - A. van Herk (Blackwell, 2005).pdf. Chemistry and Technology of Emulsion Polymerisation - A. van Herk ...

pdf steganography techniques
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. pdf steganography techniques. pdf steganography techniques.

CycleGAN, a Master of Steganography
Dec 16, 2017 - strate an intriguing property of the model: CycleGAN learns to “hide” information about a source image into the images it generates in a nearly imperceptible, high- frequency signal. This trick ensures that the generator can recove

Employing Engineering for STEM Learning -
Jun 9, 2012 - Opportunities for collaboration and outreach. • Insight on how engineering and technology integrate with the Common Core math and Next.

TCD3DIntelMovidius2017: Drone imagery and 3D ...
Sep 29, 2017 - This report describes the capture of a large set of images of. Trinity College Dublin campus, Ireland, on the 15th of July. 2017 using a drone [1], [2]. The JPEG images are released with an Attribution 4.0 International (CC BY 4.0) lic

Checklist - Employing People.pdf
Register for Data Protection or update your existing registration. Provide the new employee with an induction programme to help them settle in and pass ...

Mezclas Templadas de Emulsion Bituminosa.pdf
Page 1 of 50. 1. MEZCLAS TEMPLADAS. CON EMULSIÓN. BITUMINOSA. ASOCIACIÓN TÉNICA DE EMULSIONES BITUMINOSAS. (ATEB). Page 1 of 50 ...

Steganography: Data Hiding in Images
cryptography. Cryptography concentrates more on the security or encryption of data whereas. Steganography aims to defeat the knowledge of encryption of the message. Watermarking is about protecting the content in images;. Steganography is all about c

Enhanced Capacity and High Security Data Steganography: A ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 1, Issue 8, ... of Computer Science Engineering, IES College of Technology(Bhopal), INDIA .... provides the best carrier for steganography is that which stored with ...

Integrated voice and data transmission employing ...
significantly in a broadband wireless network. 2008 Elsevier GmbH. All rights reserved. Keywords: .... spectral efficiency (and hence network throughput). In the proposed scheme the effective transmission rate for ...... National University, South Ko

Enhanced Capacity and High Security Data Steganography: A ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 1, Issue 8, .... provides the best carrier for steganography is that which stored with ...

Fingerprint Template Protection using Steganography
fingerprint authentication system the key element in ... fingerprint template database using steganography. In this scheme steganography is applied at two levels which increase security of the system and make .... Management(IJSPTM), Vol. 1.

steganography Art of Covert Communications, Streetman.pdf ...
Whoops! There was a problem loading more pages. steganography Art of Covert Communications, Streetman.pdf. steganography Art of Covert Communications ...

Employing structural representation for symbol ...
Jun 2, 2010 - Some remarks. Part2: Content based (focused) retrieval. Experimentation. Conclusion. - 2. Plan. Part 1. Representation and recognition of graphics content in line drawing document images. Part 2. Unsupervised indexation and content base

CURRENT STATE OF STEGANOGRAPHY
Department of Computer Science ... last three years, mostly due to the war on terror. This paper discusses ... II. Terminology. Steganography is often discussed alongside watermarking, fingerprinting, covert channels, subliminal .... information on a

Steganography Using The Twelve Square Substitution Cipher.pdf ...
Loading… Whoops! There was a problem loading more pages. Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Steganograph ... n Cipher.pdf. Steganograph ... n Cipher.pdf. Open. Extract. Open with. Sign I

Substantially flat surfaced vinyl polymer emulsion particles having a ...
Jun 30, 1989 - Attorney, Agent, or Firm—Millen, White & Zelano. [57]. ABSTRACT .... pound like bisphenol A, etc., as a developer, applying the resulting ...