The technology relates to methods and apparatuses for image capture and processing.
Advances in electronics have made it trivial to capture and edit creative digital works, including images, audio, and video. These advances also make it difficult to control unauthorized copying and alteration of these works. In particular, one challenge presented by this technology is to uniquely associate a work with its creator. Another challenge is to prevent tampering of the work, or at least provide a reliable method for detecting tampering.
One way to associate multimedia data with its owner or creator is to hide identifying information in the media signal through data hiding or steganography. Steganography refers to a process of hiding information into a signal. One example of steganography is digital watermarking. Digital watermarking is a process for modifying media content to embed a machine-readable code into the data content. The data may be modified such that the embedded code is imperceptible or nearly imperceptible to the user, yet may be detected through an automated detection process. Most commonly, digital watermarking is applied to media such as images, audio signals, and video signals. However, it may also be applied to other types of data, including documents (e.g., through line, word or character shifting), software, multi-dimensional graphics models, and surface textures of objects.
Digital watermarking systems have two primary components: an embedding component that embeds the watermark in the media content, and a reading component that detects and reads the embedded watermark. The embedding component embeds a watermark by altering data samples of the media content in the spatial, temporal or some other transform domain (e.g., Fourier, Discrete Cosine, Wavelet Transform domains). The reading component analyzes target content to detect whether a watermark is present. In applications where the watermark encodes information (e.g., a message), the reader extracts this information from the detected watermark.
The present assignee's work in steganography, data hiding and watermarking is reflected in U.S. Pat. No. 5,862,260; in application Ser. Nos. 09/503,881 and 09/452,023 (now U.S. Pat. Nos. 6,614,914 and 6,408,082); and in published specifications WO 9953428 and WO0007356 (corresponding to U.S. application Ser. Nos. 09/074,034 (now U.S. Pat. No. 6,449,377) and 09/127,502 (now U.S. Pat. No. 6,345,104)). A great many other approaches are familiar to those skilled in the art. The artisan is presumed to be familiar with the full range of literature about steganography, data hiding and watermarking.
The technology provides methods, systems and devices for capturing and encoding a user attribute in a media signal. It also provides methods, systems and devices for authenticating the media signal using the encoded user attribute data.
One aspect of the technology is a method for capturing and encoding a user attribute in a media signal. This method applies to a variety of media signals, including images (still and video) and audio. The method captures a user attribute of the user of a media signal capture device, such as a camera, video recorder, etc. It then encodes the user attribute into a media signal captured by the device. The method may be implemented in the media signal capture device, which enables the user attribute data to be captured from the user and encoded into content as it is being captured by the device.
One type of user attribute data is a retinal scan. This type of data is particularly suited for digital camera applications. In such applications, an image sensor may capture the photographer's retinal image for immediate encoding into an image captured with the same or a different image sensor in the camera. The method applies to other media capture devices, media signal types, and user attributes such as a voice signature, fingerprint, etc.
Another aspect of the technology is a media signal capture device capable of encoding a user attribute in a media signal captured in the device. The device includes a user attribute capture unit for capturing a user attribute of a user of the media signal capture device. It also includes an encoder for encoding the user attribute into a media signal captured by the device.
Another aspect of the technology is a method of authenticating a media signal. The method decodes user attribute data encoded in the media signal within a media signal capture device that captured the media signal. It then compares the decoded user attribute data with user attribute data computed for a person. This process may be used to verify that a creator of the content, such as photographer, did create the media content in question (e.g., a photograph, video recording, etc.).
Further features will become apparent with reference to the following detailed description and accompanying drawings.
As depicted in
After capturing the user attribute, the method may optionally convert it into a more compact data representation. In a typical application, the user attribute is in the form of an electronic signal, such as a digital image of a retinal scan or fingerprint or a digital audio recording of the user's voice. In these cases, the method transforms the signal representing the user attribute into more compact, yet statistically unique user attribute data. Statistically unique, in this context, refers to an attribute that is statistically improbable of being generated from two different users. The process of generating the user attribute data is generally depicted as a hash in
For additional security, cryptographic functions may be used to digitally sign and encrypt the user attribute data. Encryption provides an additional layer of security to prevent unwanted uses of the encoded information. Some examples of applicable cryptographic methods include RSA, DES, IDEA (International Data Encryption Algorithm), skipjack, discrete log systems (e.g., El Gamal Cipher), elliptic curve systems, cellular automata, etc.
These cryptographic methods may be used to create a digital signature to place in a watermark message. Public key cryptographic methods employ a private and public key. The private key is kept secret, and the public key is distributed. To digitally sign a user attribute data, the media capture device encrypts the message with a private key. The private key is uniquely associated with the device or a particular user. Those having a public key verify that the message has originated from the holder of the private key by using the public key to decrypt the message.
The user attribute data may be both encrypted and digitally signed using two stages of encryption. In the encoding process, a digital signature stage encrypts at least part of the data with a private key. An encryption stage then encrypts the signed data with a public key. The decoding process reverses these steps. First, a decryption stage decrypts the data with a private key corresponding to public key used in the encryption stage. Then, a second stage decrypts the output of the previous stage with the public key corresponding to the private key used to authenticate the data.
As a separate, and potentially concurrent process to the process of capturing the user attribute data, the method captures a media signal (106) into which the user attribute data will be embedded (108). Some examples include capturing an image, or a sequence of video frames in a camera, recording an audio signal, or both image and audio capture (such as in a video camera).
Next, the method encodes the user attribute data into the media signal to create an encoded media signal (110, 112). One way to encode the data is to steganographically embed it in the media signal. Examples of steganographic embedding implementations are provided in U.S. Pat. No. 5,862,260, and U.S. patent application Ser. No. 09/503,881, referenced above. Another way to encode the user attribute data is to place it in a file header of the media signal.
The method outlined above enables user attributes to be encoded into a media signal at or near the time of capture. For example, the method may be implemented within media capture devices such as cameras, scanners, recorders, etc. This feature links the user of the capture device and creator of the media content to the content. In cases where steganographic techniques, such as digital watermarking, are used to encode the user attribute data, the association between the user attributes and the content remains through various transformations and file format changes, is imperceptible or substantially imperceptible to humans viewing or listening to the content, and can be used to establish whether or not the content has been tampered with after capture.
To provide an example,
A controller 212, such as the Central Processing Unit/Digital Camera (CPU/DCAM) integrated circuit shown in
One operation scenario proceeds as depicted in
While it holds this identifier in memory A, the controller captures an image of the subject through the primary optical element 210 and places it into memory B (306). Next, the controller performs conventional color formatting of the captured image, such as raw image to Bayer RGB image formatting (308).
The controller may also gather additional metadata relating to the image. There are many types of metadata such as: a time stamp, camera settings, a user name, location, etc. The controller may encode a cross reference link to this metadata into the image or its file header/footer. The cross reference link may be a number or other code (HTML link, pointer, address, index, etc.) that references a device where the metadata is stored. For example, the metadata may be stored in an external database and referenced via the link. The metadata may be transferred from the camera along with the image data via a wire or wireless link to the database.
Alternatively, the controller may encode the metadata directly into the image or the file header/footer (see, for example, block 310,
Returning to the example depicted in
Finally, the controller writes the image marked with the identifier to a file (314). The user or controller may transfer the image from the camera to another device via a portable memory device (such as flash memory, floppy disk, etc.) or a wire or wireless communication link (e.g., infrared, radio, wireless modem, modem, USB, USB2, IEEE 1394, computer network connection, etc.). As an additional step, the controller may also hash the marked image and insert the image hash in the file header/footer before transferring it. One simple hash is a check sum. Other cryptographic hashes may be used, such as those cited earlier.
Next, the method proceeds to check the user attribute data. It decodes the embedded user attribute data (408, 410) from the image using a decoder compatible with the encoder. It then compares the extracted user data with separately computed user data to determine whether there is a match (412).
There are several application scenarios for this user authentication process. In one scenario, the user attribute data for a person purported to be the photographer is captured (414, 416), hashed (418, 420) and compared with the extracted user data (412). If there is a match, then the photographer is deemed to have created the suspect image (422). In another scenario, user attributes (416) for several photographers are captured (416), hashed (418), and stored in a database (420), along with information about the person. The user attribute data extracted from the image is used as an index to this database to look up the identity of the photographer.
The processes depicted in
While the specific examples provided in
Having described and illustrated the principles of the technology with reference to specific implementations, it will be recognized that the technology can be implemented in many other, different, forms. To provide a comprehensive disclosure without unduly lengthening the specification, applicants incorporate by reference the patents and patent applications referenced above. These patents and patent applications provide additional details about implementing watermarking systems.
The particular combinations of elements and features in the above-detailed embodiments are exemplary only; the interchanging and substitution of these teachings with other teachings in this and the incorporated-by-reference patents/applications are also contemplated.
This application is a division of application Ser. No. 11/382,207 (now U.S. Pat. No. 7,769,208), which is a continuation of application Ser. No. 09/585,678, filed Jun. 1, 2000 (now U.S. Pat. No. 7,043,048). The subject matter of the present application is related to that disclosed in U.S. Pat. No. 5,862,260, and in application Ser. No. 09/503,881, filed Feb. 14, 2000 (now U.S. Pat. No. 6,614,914). The foregoing documents are incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
4015240 | Swonger et al. | Mar 1977 | A |
4109237 | Hill | Aug 1978 | A |
4528588 | Lofberg | Jul 1985 | A |
4620318 | Hill | Oct 1986 | A |
4994831 | Marandi | Feb 1991 | A |
4995086 | Lilley et al. | Feb 1991 | A |
5103486 | Grippi | Apr 1992 | A |
5284364 | Jain | Feb 1994 | A |
5499294 | Friedman | Mar 1996 | A |
5541655 | Kaneda | Jul 1996 | A |
5579079 | Yamada et al. | Nov 1996 | A |
5646997 | Barton | Jul 1997 | A |
5767496 | Swartz et al. | Jun 1998 | A |
5787186 | Schroeder | Jul 1998 | A |
5799092 | Kristol et al. | Aug 1998 | A |
5841886 | Rhoads | Nov 1998 | A |
5857038 | Owada et al. | Jan 1999 | A |
5862260 | Rhoads | Jan 1999 | A |
5907149 | Marckini | May 1999 | A |
5917542 | Moghadam et al. | Jun 1999 | A |
5995630 | Borza | Nov 1999 | A |
6005936 | Shimizu et al. | Dec 1999 | A |
6064737 | Rhoads | May 2000 | A |
6064764 | Bhaskaran et al. | May 2000 | A |
6122403 | Rhoads | Sep 2000 | A |
6148091 | DiMaria | Nov 2000 | A |
6185316 | Buffam | Feb 2001 | B1 |
6185318 | Jain et al. | Feb 2001 | B1 |
6208746 | Musgrave | Mar 2001 | B1 |
6229924 | Rhoads et al. | May 2001 | B1 |
6243481 | Tao | Jun 2001 | B1 |
6263091 | Jain et al. | Jul 2001 | B1 |
6289112 | Jain et al. | Sep 2001 | B1 |
6292092 | Chow et al. | Sep 2001 | B1 |
6301368 | Bolle et al. | Oct 2001 | B1 |
6307949 | Rhoads | Oct 2001 | B1 |
6311214 | Rhoads | Oct 2001 | B1 |
6314197 | Jain et al. | Nov 2001 | B1 |
6321981 | Ray et al. | Nov 2001 | B1 |
6332193 | Glass et al. | Dec 2001 | B1 |
6366680 | Brunk et al. | Apr 2002 | B1 |
6377699 | Musgrave et al. | Apr 2002 | B1 |
6381341 | Rhoads | Apr 2002 | B1 |
6385329 | Sharma et al. | May 2002 | B1 |
6389151 | Carr et al. | May 2002 | B1 |
6397334 | Chainer et al. | May 2002 | B1 |
6408082 | Rhoads et al. | Jun 2002 | B1 |
6421070 | Ramos et al. | Jul 2002 | B1 |
6424725 | Rhoads et al. | Jul 2002 | B1 |
6433818 | Steinberg et al. | Aug 2002 | B1 |
6516079 | Rhoads et al. | Feb 2003 | B1 |
6522770 | Seder et al. | Feb 2003 | B1 |
6535617 | Hannigan et al. | Mar 2003 | B1 |
6542927 | Rhoads | Apr 2003 | B2 |
6553129 | Rhoads | Apr 2003 | B1 |
6567533 | Rhoads | May 2003 | B1 |
6577336 | Safai | Jun 2003 | B2 |
6580808 | Rhoads | Jun 2003 | B2 |
6590608 | Matsumoto et al. | Jul 2003 | B2 |
6590996 | Reed et al. | Jul 2003 | B1 |
6611607 | Davis et al. | Aug 2003 | B1 |
6614914 | Rhoads et al. | Sep 2003 | B1 |
6647128 | Rhoads | Nov 2003 | B1 |
6647130 | Rhoads | Nov 2003 | B2 |
6650761 | Rodriguez et al. | Nov 2003 | B1 |
6681028 | Rodriguez et al. | Jan 2004 | B2 |
6681029 | Rhoads | Jan 2004 | B1 |
6687383 | Kanevsky et al. | Feb 2004 | B1 |
6694042 | Seder et al. | Feb 2004 | B2 |
6694043 | Seder et al. | Feb 2004 | B2 |
6700990 | Rhoads | Mar 2004 | B1 |
6700995 | Reed | Mar 2004 | B2 |
6704869 | Rhoads et al. | Mar 2004 | B2 |
6718046 | Reed et al. | Apr 2004 | B2 |
6718047 | Rhoads | Apr 2004 | B2 |
6721440 | Reed et al. | Apr 2004 | B2 |
6760463 | Rhoads | Jul 2004 | B2 |
6763123 | Reed et al. | Jul 2004 | B2 |
6768809 | Rhoads et al. | Jul 2004 | B2 |
6775392 | Rhoads | Aug 2004 | B1 |
6798894 | Rhoads | Sep 2004 | B2 |
6813366 | Rhoads | Nov 2004 | B1 |
6879701 | Rhoads | Apr 2005 | B1 |
6917724 | Seder et al. | Jul 2005 | B2 |
6920232 | Rhoads | Jul 2005 | B2 |
6931451 | Logan et al. | Aug 2005 | B1 |
6947571 | Rhoads et al. | Sep 2005 | B1 |
6975746 | Davis et al. | Dec 2005 | B2 |
6988202 | Rhoads et al. | Jan 2006 | B1 |
6996252 | Reed et al. | Feb 2006 | B2 |
7003731 | Rhoads et al. | Feb 2006 | B1 |
7024016 | Rhoads et al. | Apr 2006 | B2 |
7027614 | Reed | Apr 2006 | B2 |
7035427 | Rhoads | Apr 2006 | B2 |
7043048 | Ellingson | May 2006 | B1 |
7044395 | Davis et al. | May 2006 | B1 |
7047418 | Ferren et al. | May 2006 | B1 |
7051086 | Rhoads et al. | May 2006 | B2 |
7054465 | Rhoads | May 2006 | B2 |
7062069 | Rhoads | Jun 2006 | B2 |
7095871 | Jones et al. | Aug 2006 | B2 |
7111170 | Rhoads et al. | Sep 2006 | B2 |
7113614 | Rhoads | Sep 2006 | B2 |
7139408 | Rhoads et al. | Nov 2006 | B2 |
7158654 | Rhoads | Jan 2007 | B2 |
7164780 | Brundage et al. | Jan 2007 | B2 |
7171016 | Rhoads | Jan 2007 | B1 |
7174031 | Rhoads et al. | Feb 2007 | B2 |
7177443 | Rhoads | Feb 2007 | B2 |
7184570 | Rhoads | Feb 2007 | B2 |
7213757 | Jones et al. | May 2007 | B2 |
7215793 | Takahashi | May 2007 | B2 |
7224819 | Levy et al. | May 2007 | B2 |
7224995 | Rhoads | May 2007 | B2 |
7248717 | Rhoads | Jul 2007 | B2 |
7261612 | Hannigan et al. | Aug 2007 | B1 |
7289643 | Brunk | Oct 2007 | B2 |
7305104 | Carr et al. | Dec 2007 | B2 |
7308110 | Rhoads | Dec 2007 | B2 |
7313251 | Rhoads | Dec 2007 | B2 |
7319775 | Sharma et al. | Jan 2008 | B2 |
7330564 | Brundage et al. | Feb 2008 | B2 |
7369678 | Rhoads | May 2008 | B2 |
7377421 | Rhoads | May 2008 | B2 |
7391880 | Reed et al. | Jun 2008 | B2 |
7406214 | Rhoads et al. | Jul 2008 | B2 |
7424131 | Alattar et al. | Sep 2008 | B2 |
7427030 | Jones et al. | Sep 2008 | B2 |
7433491 | Rhoads | Oct 2008 | B2 |
7444000 | Rhoads | Oct 2008 | B2 |
7444392 | Rhoads et al. | Oct 2008 | B2 |
7450734 | Rodriguez et al. | Nov 2008 | B2 |
7460726 | Levy et al. | Dec 2008 | B2 |
7466840 | Rhoads | Dec 2008 | B2 |
7486799 | Rhoads | Feb 2009 | B2 |
7502759 | Hannigan et al. | Mar 2009 | B2 |
7508955 | Carr et al. | Mar 2009 | B2 |
7515733 | Rhoads | Apr 2009 | B2 |
7536034 | Rhoads et al. | May 2009 | B2 |
7537170 | Reed et al. | May 2009 | B2 |
7545952 | Brundage et al. | Jun 2009 | B2 |
7564992 | Rhoads | Jul 2009 | B2 |
RE40919 | Rhoads | Sep 2009 | E |
7602978 | Levy et al. | Oct 2009 | B2 |
7628320 | Rhoads | Dec 2009 | B2 |
7643649 | Davis et al. | Jan 2010 | B2 |
7650009 | Rhoads | Jan 2010 | B2 |
7653210 | Rhoads | Jan 2010 | B2 |
7657058 | Sharma | Feb 2010 | B2 |
7685426 | Ramos et al. | Mar 2010 | B2 |
7693300 | Reed et al. | Apr 2010 | B2 |
7697719 | Rhoads | Apr 2010 | B2 |
7711143 | Rhoads | May 2010 | B2 |
7738673 | Reed | Jun 2010 | B2 |
7747038 | Rhoads | Jun 2010 | B2 |
7751588 | Rhoads | Jul 2010 | B2 |
7751596 | Rhoads | Jul 2010 | B2 |
7756290 | Rhoads | Jul 2010 | B2 |
7760905 | Rhoads et al. | Jul 2010 | B2 |
7762468 | Reed et al. | Jul 2010 | B2 |
7769208 | Ellingson | Aug 2010 | B2 |
7787653 | Rhoads | Aug 2010 | B2 |
7792325 | Rhoads et al. | Sep 2010 | B2 |
7822225 | Alattar | Oct 2010 | B2 |
7837094 | Rhoads | Nov 2010 | B2 |
7945781 | Rhoads | May 2011 | B1 |
7949147 | Rhoads et al. | May 2011 | B2 |
7953270 | Rhoads | May 2011 | B2 |
7953824 | Rhoads et al. | May 2011 | B2 |
7957553 | Ellingson et al. | Jun 2011 | B2 |
7961949 | Levy et al. | Jun 2011 | B2 |
20010007130 | Takaragi | Jul 2001 | A1 |
20010011680 | Soltesz et al. | Aug 2001 | A1 |
20010025342 | Uchida | Sep 2001 | A1 |
20010034705 | Rhoads et al. | Oct 2001 | A1 |
20010034835 | Smith | Oct 2001 | A1 |
20010055407 | Rhoads | Dec 2001 | A1 |
20020009208 | Alattar et al. | Jan 2002 | A1 |
20020010684 | Moskowitz | Jan 2002 | A1 |
20020061120 | Carr et al. | May 2002 | A1 |
20020072935 | Rowse et al. | Jun 2002 | A1 |
20020080396 | Silverbrook et al. | Jun 2002 | A1 |
20020131076 | Davis | Sep 2002 | A1 |
20020176003 | Seder et al. | Nov 2002 | A1 |
20020186886 | Rhoads | Dec 2002 | A1 |
20020196272 | Ramos et al. | Dec 2002 | A1 |
20030011684 | Narayanaswami et al. | Jan 2003 | A1 |
20030038879 | Rye et al. | Feb 2003 | A1 |
20030040957 | Rhoads et al. | Feb 2003 | A1 |
20030105730 | Davis et al. | Jun 2003 | A1 |
20030130954 | Carr et al. | Jul 2003 | A1 |
20040005093 | Rhoads | Jan 2004 | A1 |
20040101212 | Fedorovskaya et al. | May 2004 | A1 |
20040190750 | Rodriguez et al. | Sep 2004 | A1 |
20040240704 | Reed | Dec 2004 | A1 |
20040264733 | Rhoads et al. | Dec 2004 | A1 |
20050036656 | Takahashi | Feb 2005 | A1 |
20050041835 | Reed et al. | Feb 2005 | A1 |
20050058318 | Rhoads | Mar 2005 | A1 |
20050192933 | Rhoads et al. | Sep 2005 | A1 |
20060013435 | Rhoads | Jan 2006 | A1 |
20060041591 | Rhoads | Feb 2006 | A1 |
20060251291 | Rhoads | Nov 2006 | A1 |
20070055884 | Rhoads | Mar 2007 | A1 |
20070108287 | Davis et al. | May 2007 | A1 |
20070276841 | Rhoads et al. | Nov 2007 | A1 |
20070276928 | Rhoads et al. | Nov 2007 | A1 |
20080121728 | Rodriguez | May 2008 | A1 |
20080133555 | Rhoads et al. | Jun 2008 | A1 |
20080292134 | Sharma et al. | Nov 2008 | A1 |
20090012944 | Rodriguez et al. | Jan 2009 | A1 |
20090125475 | Rhoads et al. | May 2009 | A1 |
20090232352 | Carr et al. | Sep 2009 | A1 |
20090286572 | Rhoads et al. | Nov 2009 | A1 |
20090290754 | Rhoads | Nov 2009 | A1 |
20100045816 | Rhoads | Feb 2010 | A1 |
20100062819 | Hannigan et al. | Mar 2010 | A1 |
20100172540 | Davis et al. | Jul 2010 | A1 |
20100198941 | Rhoads | Aug 2010 | A1 |
20100315495 | Ellingson | Dec 2010 | A1 |
20110007936 | Rhoads | Jan 2011 | A1 |
20110026777 | Rhoads et al. | Feb 2011 | A1 |
20110051998 | Rhoads | Mar 2011 | A1 |
20110062229 | Rhoads | Mar 2011 | A1 |
20110091066 | Alattar | Apr 2011 | A1 |
Number | Date | Country |
---|---|---|
WO9603286 | Feb 1996 | WO |
WO9827510 | Jun 1998 | WO |
WO0070585 | Jan 2000 | WO |
WO0036605 | Jun 2000 | WO |
Number | Date | Country | |
---|---|---|---|
20100315495 A1 | Dec 2010 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 11382207 | May 2006 | US |
Child | 12849514 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 09585678 | Jun 2000 | US |
Child | 11382207 | US |