Detecting information hidden out-of-phase in color channels

Information

  • Patent Grant
  • 6804377
  • Patent Number
    6,804,377
  • Date Filed
    Tuesday, April 2, 2002
    22 years ago
  • Date Issued
    Tuesday, October 12, 2004
    20 years ago
Abstract
The present invention relates to detecting steganographically hiding images and information. In a preferred embodiment, an image is hidden within a media signal. The media preferably includes a cyan (C) color plane, a magenta (M) color plane, a yellow (Y) color plane and a black (K) color plane. In an alternative embodiment, the media includes a spot color. The image is converted into a black color channel image and is then applied to the media's K channel. The black channel image is inverted and the inverted image is applied to the media's CMY (or spot) color planes. For detection, the embedded media is illuminated with infrared light, which emphasizes the black color plane. An input device captures a digital image of the illuminated media. The image is detected or displayed based on the emphasized black plane.
Description




FIELD OF THE INVENTION




The present invention relates to hiding data, and is particularly illustrated with reference to hiding information out-of-phase in color channels.




BACKGROUND AND SUMMARY OF THE INVENTION




The above mentioned parent applications disclose various techniques for embedding and detecting out-of-phase digital watermarks.




Digital watermarking technology, a form of steganography, encompasses a great variety of techniques by which plural bits of digital data are hidden in some other object, preferably without leaving human-apparent evidence of alteration.




Digital watermarking may be used to modify media content to embed a machine-readable code into the media content. The media may be modified such that the embedded code is imperceptible or nearly imperceptible to the user, yet may be detected through an automated detection process.




Digital watermarking systems typically have two primary components: an embedding component that embeds the watermark in the media content, and a reading component that detects and reads the embedded watermark. The embedding component embeds a watermark pattern by altering data samples of the media content. The reading component analyzes content to detect whether a watermark pattern is present. In applications where the watermark encodes information, the reading component extracts this information from the detected watermark. Assignee's U.S. patent application Ser. No. 09/503,881, filed Feb. 14, 2000, discloses various encoding and decoding techniques. U.S. Pat. Nos. 5,862,260 and 6,122,403 disclose still others. Each of these U.S. patent documents is herein incorporated by reference.




Now consider our inventive out-of-phase digital watermarking techniques with reference to

FIGS. 1



a


and


1




b


. In

FIG. 1



a


, the dash/dot C, M, Y and K lines represent, respectively, cyan, magenta, yellow and black color channels for a line (or other area) of a media signal (e.g., a picture, image, media signal, document, etc.). The

FIG. 1



a


lines represent a base level or a particular color (or gray-scale) level (or intensity). Of course, it is expected that the color (or gray-scale) level will vary over the media signal.

FIG. 1



b


illustrates the media of

FIG. 1



a


, which has been embedded with an out-of-phase digital watermark signal. The watermark signal is preferably applied to each of the color component dimensions C, M and Y.




In

FIGS. 1



a


and


1




b


, the M and Y channels are represented by one signal, since these color components can be approximately equal, but separate signals. Of course, it is not necessary for these components to be equal, and in many cases the yellow and magenta components are not equal. The illustrated “bumps” (or “tweaks”) in

FIG. 1



b


represent the digital watermark signal, e.g., upward and downward signal adjustments in relation to a respective color channel at given points over the media signal. The tweaks are preferably applied at the same level (or signal strength). Alternatively, the bumps are applied with a different signal strength (or tweak level) when compared to one another. Of course, these tweaks can be embedded over a color channel in a predetermined pattern, a pseudo random fashion, a random fashion, etc., to facilitate embedding of a digital watermark signal.




For the K dimension (or channel), the digital watermark signal is preferably embedded to be out-of-phase with respect to the CMY channels. Most preferably, the K channel is approximately 180 degrees out-of-phase (e.g., inverted) with the watermark signals in the CMY color channels, as shown in

FIG. 1



b


. For example, if a digital watermark signal modifies each of the color channels at a media' first location with a tweak level of say 7, then a tweak level of −7 correspondingly modifies the K channel at the media's first location. This inventive digital watermark technique is referred to as our out-of-phase (or “K-phase”) digital watermark. (We note that if a watermark signal is determined in terms of luminance, we can assign or weight corresponding tweak levels to the respective color plane pixel values to achieve the luminance value tweak. Indeed, a tweak can be spread over the CMY channels to achieve a collective luminance at a given media location. The luminance attributable to the CMY tweak is preferably cancelled or offset by the luminance effect attributable to a corresponding inverted K channel tweak at the give media location.).




Our inventive watermarking scheme greatly reduces watermark perceptibility. Since the watermark signal for the K channel is applied approximately 180 degrees out-of-phase, when compared to the respective tweaks applied to the C, M and/or Y channels, the watermark visibility is greatly reduced. The visibility reduction is achieved by the effective cancellation of perceived luminance changes when the CMYK image is viewed or printed. Indeed, combining an inverted watermark signal “tweak” or “bump” in a K channel with a corresponding non-inverted watermark signal tweak or bump in the CMY channels effectively cancels an overall perceived luminance change for a given area (e.g., a pixel or block of pixels)—greatly reducing visibility of the digital watermark.




The present invention discloses a new data hiding technique based on our out-of-phase technology. According to one implementation of the present invention, an image is hidden in or carried by a media signal. The hiding is accomplished with our out-of-phase embedding techniques. The image can be a photograph, a graphic, a barcode (1-D or 2-D), etc., etc. Another aspect of our inventive techniques is used to improve the visibility characteristics of our out-of-phase embedding techniques.




The foregoing and other aspects, features and advantages of the present invention will be even more apparent from the following detailed description, which proceeds with reference to the accompanying drawings.











BRIEF DESCRIPTION OF THE DRAWINGS





FIG. 1



a


is a diagram illustrating CMYK channels.





FIG. 1



b


illustrates the color CMYK channels of

FIG. 1



a


, embedded with information.





FIG. 2

illustrates hiding an image in media.





FIG. 3

is a flow diagram illustrating an embedding method according to one implementation of the present invention.





FIGS. 4 and 5

are graphs showing hidden signal strength in terms of luminance.





FIGS. 6 and 7

are graphs showing hidden signal strength in terms of color saturation.





FIG. 8

illustrates limiting a signal tweak in low CMY areas to reduce hidden signal visibility.





FIG. 9

illustrates the segmentation of media into blocks.





FIG. 10

illustrates a feedback loop in an embedding process.





FIG. 11

illustrates feedback for the

FIG. 10

feedback loop.





FIGS. 12



a


and


12




b


illustrate detection apparatus.





FIG. 13

illustrates orientation fiducials hidden in a media signal with our out-of-phase embedding techniques.





FIG. 14

illustrates out-of-phase embedding of a spot color.





FIG. 15

illustrates a printer calibration process.











DETAILED DESCRIPTION




Image Embedding




With reference to

FIG. 2

, an image


10


is steganographically hidden within media


12


. Of course, media


12


may represent digital media such as an image, photograph, video frame, graphic, picture, logo, product tag, product documentation, visa, business card, art work, brochure, document, product packaging, trading card, banknote, deed, poster, ID card (including a driver's license, member card, identification card, security badge, passport, etc.), postage stamp, etc., etc. And image


10


can correspond to a digital representation of a photograph, picture, graphic, text, orientation fiducial, object, barcode, message, digital watermark, outline, symbol, etc., etc. In the

FIG. 2

example, image


10


includes a close-up photograph, and the media includes a driver's license or passport photograph. The hiding (or embedding) is accomplished using our inventive out-of-phase techniques.




With reference to

FIG. 3

, our K-phase hiding is preferably initiated by converting image


10


to a black channel image


10


′ (step


30


—FIG.


3


). Most digital imaging software tools such as Adobe's Photoshop facilitate such a black channel conversion. The black channel image


10


′ includes a set of black pixel values (e.g., grayscale values)


10


′. A location in the media


12


is selected to place the black channel image (step


32


). The dashed circle


13


in

FIG. 2

represents this selected location. The media


12


location can be represented by sets of media


12


pixels. (For example, a first set of pixels corresponds to the selected location's black channel values, a second set corresponds to the selected location's cyan channel values, a third set corresponds to the selected location's magenta channel values, and a fourth set corresponds to the selected location's yellow channel values.). The set of black channel image


10


′ values is applied to the black channel pixels in the selected location of media


12


—effectively modifying media


12


(step


34


). For example, if an image


10


′ pixel includes a gray-scale value of 3, this gray-scale value is applied to a corresponding pixel in the selected media


12


location to raise that corresponding pixel value by 3. In an alternative implementation, instead of adjusting the corresponding pixel in the selected media


12


location by the gray-scale value, we replace that corresponding pixel value with the black image


10


′ gray-scale value. In another implementation, the corresponding media


12


pixel is modified to achieve the gray-scale value of the image


10


′ pixel. Of course we can scale and/or weight the gray-scale value as needed prior to modifying pixels in the selected location of media


12


.




The black channel image


10


′ is inverted to produce a set of signal tweaks (step


36


). For example, if a black channel pixel is tweaked by a grayscale value of say 24, then a corresponding, inverted CMY tweak value is −24. (As an alternative implementation, image


10


is converted into corresponding C, M and Y images and such images are applied to their respective channels. These signal tweaks are then used to modify or change the color values in their respective CMY color channels (step


38


). Most preferably, in the above example, the −24-tweak value is applied to each of the CMY color channels. The overall luminance cancellation can be effected as such. In another implementation we unevenly spread the tweak value over the CMY channels to achieve an overall luminance change in a given media location to cancel the +24 tweak in the black channel. For example, if using a luminance equation of: L=0.3*C+0.6*M+0.1*Y, we can achieve an overall luminance tweak of −24 by tweaking C=−15, M=−30 and Y=−15. Of course there is a vast range of other color combinations to achieve the same collective luminance change. Care should be taken, however, to minimize a color shift when using this tweak-spreading alternative. The CMY pixels and the K pixels are thus out-of-phase with respect to one another—resulting in a local cancellation of the perceived luminance change. Accordingly, image


10


is successfully hidden or carried by media


12


.




The selected location


13


can be determined manually, e.g., via editing software tools (like Adobe's Photoshop). Or the selection process can be automated.




Image Hiding Enhancements




We have developed improvements to enhance our out-of-phase hiding techniques. These improvements apply to hiding both images and digital watermark signals (in this section both will be referred to as a hidden signal). While these techniques are not necessary to carry out our out-of-phase hiding techniques, they generally reduce the visibility of a hidden signal. Consider our following inventive improvements.




High Luminance Areas




Media


12


may include areas of low CMY and/or K ink (or signal intensity). In a first case, an area includes little or no C, M and/or Y ink. This results in an inability to counteract (or cancel) an inverted signal in a corresponding channel(s). Accordingly, we can sample the luminance of a media


12


area (or pixel) and, based on the luminance level, determine whether to scale back the hidden signal strength. For example, we begin to scale back the signal strength once the luminance reaches a predetermined threshold (e.g., in a range of 70-95% luminance). We can scale back the signal strength for a given area according to a linear reduction, as shown in

FIG. 4

, or we can scale the signal strength in a non-linear manner, e.g., as shown in FIG.


5


. The illustrated scaling signal strength applies to both the K channel and CMY channels. In a related implementation, we determine the luminance of the yellow channel. We base our scaling decisions on the yellow luminance percentage.




Saturated Color




Hiding signals in a saturated color area can also result in increased hidden signal visibility concerns. For this document the term “saturation” refers to how pure a color is, or refers to a measure of color intensity. For example, saturation can represent the degree of color intensity associated with a color's perceptual difference from a white, black or gray of equal lightness. We determine the color saturation level in a color plane (e.g., the yellow color plane), and then scale back a hidden signal strength as the color saturation level exceeds a predetermined level (e.g., 80% yellow color saturation). As with the

FIGS. 4 and 5

implementations, we can scale the signal strength in a linear manner (

FIG. 6

) or in a non-linear manner (FIG.


7


).




Low or High Luminance Areas




We have found that we can even further improve the visibility characteristics of our hidden signals by considering the amount of luminance at a given pixel or other media


12


area. A low luminance may indicate that there is insufficient CMY to compensate for a K channel tweak. For example, a 10% luminance in CMY for a given pixel implies that the pixel can accommodate only about a 10% signal tweak (e.g., remember the simplified luminance relationship mentioned above: L=0.3*C+0.6*M+0.1*Y). With reference to

FIG. 8

, we can cap (or limit) the positive K tweak signal level in such low CMY areas to ensure that the CMY levels can be sufficiently decreased to counteract or cancel the positive K channel signal.




Similarly, in an area of high CMY luminance, a negative K channel tweak can be capped (or limited) to ensure a sufficient range to increase the CMY values.




Equalizing Detectability




Now consider an implementation where media


12


is segmented into a plurality of blocks (FIG.


9


). Here a block size can range from a pixel to a group of pixels. We redundantly embed an image or watermark signal in each of (or a subset of) the blocks. As shown in

FIG. 10

, we preferably use signal feedback (k) to regulate the embedding process. A signal feedback (k) method is shown in

FIG. 11. A

black (K) channel image or watermark signal (in this section hereafter both referred to as a “watermark”) is embedded in block i of media


12


(step


110


), where “i” is an integer ranging from 1-n and where n is the total number of blocks. The watermark signal is inverted (step


112


) and embedded in the CMY channels of block i (step


114


). At this point, we preferably perform a detection process of the signal embedded within the i


th


block (step


116


). The detection process determines whether the signal is sufficiently detectable (step


118


). The term “sufficient” in this context can include a plurality of levels. In one, “sufficient” implies that the signal is detectable. In another, the detectability of the signal is ranked (e.g., according to error correction needed, ease of detectability, or a detection-reliability metric, etc.). The term sufficient in a ranking context also implies that the detection ranking is above a predetermined threshold. The process moves to embed a new block i+1 if the embedding is sufficient (


120


). Otherwise the signal strength is increased or otherwise altered (step


122


) and the embedding of block i is repeated.




Such a signal feedback process helps to ensure consistent embedding throughout media


12


.




Infrared Image Detection




An infrared detection method is illustrated with reference to

FIG. 12



a


. In particular, the illustrated detection method employs infrared illumination to facilitate image (or watermark) detection. Media


12


is illuminated with an infrared illumination source


14


. The media


12


is embedded as discussed above, for example, to include various components in a multicolor dimension space (e.g., CMYK). A first component (or image) is preferably embedded in the CMY channels. A second component (or image) is embedded in the K channel. The second component is preferably inverted (or is out-of-phase) with respect to the CMY channels.




Infrared illumination source


14


preferably includes a light emitting diode, e.g., emitting approximately in a range of 800 nm-1400 nm, or a plurality of light emitting diodes (“LED”). Of course, there are many commercially available infrared diodes, and such may be suitable used with our present detection techniques. It will be appreciated that many commercially available incandescent light sources emit light both in the visible and infrared (“IR”) spectrums. Such incandescent light sources may alternatively be used as infrared illumination source


14


. Indeed, infrared watermark detection may be possible in otherwise normal (“daylight”) lighting conditions, particularly when using an IR-pass filter.




A conventional power source powers the infrared illumination source. (We note that a variable trim resistor and a small wall transformer can be optionally employed to control illumination source


14


.). Power alternately can be supplied from a battery pack, voltage or current source, or by directly tapping a power source of a camera, e.g., internally drawn from a parallel, USB, or corded power lines. For a consumer device, a battery pack or a single power cord that is stepped down inside a digital watermark reader housing can also be used.




Returning to the composition of an out-of-phase hidden image (or watermark), a first image (or watermark) component is embedded in a K (or black) channel. A second image component, e.g., which is out-of-phase with respect to the K channel, is embedded in the CMY channels. These characteristics have significance for infrared detection. In particular, C, M and Y inks will typically have high transmission characteristics in the infrared spectrum when printed, which render them nearly imperceptible under infrared illumination. Yet conventional black inks absorb a relatively high amount of infrared light, rendering the black channel perceptible with infrared illumination. We note that standard processing inks, such as those conforming to the standard web offset press (SWOP) inks, include black ink with IR detection properties. Of course, there are many other inks that may be suitably interchanged with the present invention.




As discussed above our out-of-phase embedding provides an effective cancellation of perceived luminance changes when the CMYK image is viewed in the visible spectrum. Indeed, combining an inverted watermark signal “tweak” or “bump” in a K channel with a corresponding non-inverted watermark signal tweak or bump in the CMY channels effectively cancels an overall perceived luminance change. However, under infrared illumination, the hidden image (or watermark) component in the black (K) channel becomes perceptible without interference from the C, M and Y channels. An infrared image primarily portrays (e.g., emphasizes) the black channel, while the C, M and Y channels are effectively imperceptible under infrared illumination.




In one implementation, camera


16


captures an image of media


12


. Preferably, camera


16


includes an IR-Pass filter that passes IR while filtering visible light. For example, the Hoya RM90 filter available from M&K Optics L.L.C. is one of many IR-Pass/Visible Opaque filters suitable for daylight detection. Another suitable filter is the RG850 filter, part number NT54-664, available from Edmund Scientific. These filters are offered as examples only, and certainly do not define the entire range of suitable IR-pass filters. Of course there are many other IR-Pass filters that are suitably interchangeable with the present invention.




In yet another implementation, a conventional digital camera (or web cam) is modified so as to capture infrared light. In particular, most digital cameras and web cams include an IR filter, which filters out IR light. Removing the IR filter allows the camera to capture light in the IR spectrum. Consider a visibly dark environment (e.g., an enclosed case, shielded area, dark room, etc.). Media


12


is illuminated by infrared illumination source


14


in the visibly dark environment. Camera


16


(without an IR filter) effectively captures an infrared image (i.e., the K channel image) corresponding to the illuminated media


12


.




The captured image is communicated to computer


18


. Preferably, computer


18


includes executable software instructions stored in memory for execution by a CPU or other processing unit. If media


12


includes a digital watermark, the software instructions preferably include instructions to detect and decode the embedded digital watermark. Otherwise, the instructions preferably include instructions to display the K-phase image. The software instructions can be stored in memory or electronic memory circuits. Of course, computer


18


can be a handheld computer, a laptop, a general-purpose computer, a workstation, etc. Alternatively, computer


18


includes a hard-wired implementation, which precludes the need for software instructions.




With reference to

FIG. 12



b


, a detection housing


20


can be provided to house an infrared illumination source


14


and digital camera (both not shown in

FIG. 12



b


, since they are within the opaque housing


20


). The housing


20


is preferably opaque to shield (or otherwise constructed to filter) the camera and media


12


from visible light. The housing


20


has an opening


20




a


to receive the media


12


. In a first case, opening


20




a


is adapted to engulf media


12


. This allows media


12


to be placed on a surface (e.g., table, imaging station, or counter) and the housing opening


20




a


to be placed over media


12


, effectively shielding media


12


from visible light. In a second case, the opening


20




a


receives media


12


into (e.g., slides media through opening


20




a


) and positions media


12


within the opaque housing


20


. In either implementation, the infrared illumination source


14


illuminates media


12


, and the digital camera


12


captures an image of the illuminated media (e.g., captures as image of the K-channel image). The digital camera


12


communicates with computing device


14


, which detects and decodes a digital watermark embedded with media


12


, if present, or otherwise displays the image.




In another illustrative embodiment, the above described infrared detection technique is carried out in a visibly dark environment, such as a dark room, shielded area, etc. An out-of-phase image (or digital watermark) is embedded in media. The media is illuminated with an infrared illumination source, and a digital camera captures an image of the illuminated media.




In still another illustrative embodiment, the above described infrared detection technique is carried out in a visibly lighted environment. An out-of-phase image (or watermark) is embedded in media. The media is illuminated with an infrared illumination source, and a digital camera captures an image of the media. Preferably, the camera includes an IR-pass filter. The digital camera communicates with a computing device, which detects and decodes an out-of-phase image (or digital watermark) embedded in the media.




Infrared detection is an elegant solution to detect out-of-phase images or digital watermarks, since high transmission colors in the IR spectrum are effectively washed out, allowing detection of a low transmission color channel. Specialized inks are not required to embed the out-of-phase digital watermark. Indeed most multicolor printer ink packs, offset ink, process inks, dye diffusion thermal transfer inks, such as inks conforming to the SWOP standard include black inks that allow infrared detection. Some of these inks include a carbon-based black ink, furthering the absorption of IR. While infrared detection is ideal for out-of-phase images or digital watermarks, this method is also applicable to detection of conventional digital watermarks. For instance, a watermark signal can be embedded only in a black channel of media. Infrared illumination helps to reveal the embedded watermark in this black channel. Alternatively, a digital watermark is embedded across many color planes, while detection is carried out in only those color planes that are perceptible with IR illumination. Additionally, while we have discussed infrared detection techniques, we note that ultraviolet (UV) detection is also possible. In this case, one of the color channels (including the K channel) preferably includes UV pigments or properties. A UV detection process is carried out in a manner analogous to that discussed above. (We also note that a CMY color can include IR/UV pigments or properties to facilitate detection of that color with respective IR or UV detection methods.).




Applications




Now consider a few applications of our inventive out-of-phase hiding techniques.




Identification Documents (e.g., Passports, Driver's Licenses, etc.)




An out-of-phase image is hidden in an identification document to provide enhanced security. For example, a hidden image is a gray-scale version of the identification document's photograph. An airport screener, or law enforcement officer, illuminates the out-of-phase image with infrared (or ultraviolet) light for comparison of the hidden image to the printed photograph. Or, instead of a photograph, the hidden image may include text, which can be compared with the visibly printed text on the identification document.




In assignee's U.S. application Ser. No. 10/094,593, titled “Identification Document Including Embedded Data,” filed Mar. 6, 2002 (Attorney Docket No. P0587), we disclosed various security and authentication improvements. One disclosed improvement ties machine-readable code such as barcode information to a digital watermark. Our inventive out-of-phase hiding techniques can be used with the techniques disclosed in the above-mentioned application. For example, instead of hiding an out-of-phase image in the identification document, we instead embedded an out-of-phase digital watermark. The digital watermark includes a payload, which has information corresponding to the printed information or to information included in a barcode. In one implementation, the information includes a hash of the barcode information. In another implementation, we hid a barcode in the identification document as discussed below.




Hiding Bar Codes in Out-of-Phase Channels




Over the years, a number of standards organizations and private entities have formed symbology standards for bar codes. Some examples of standards bodies include the Uniform Code Council (UCC), European Article Numbering (EAN, also referred to as International Article Numbering Association), Japanese Article Numbering (JAN), Health Industry Bar Coding Counsel (HIBC), Automotive Industry Action Group (AIAG), Logistics Application of Automated Marking and Reading Symbols (LOGMARS), Automatic Identification Manufacturers (AIM), American National Standards Institute (ANSI), and International Standards Organization (ISO).




The UCC is responsible for the ubiquitous bar code standard called the Universal Product Code (UPC). AIM manages standards for industrial applications and publishes standards called Uniform Symbology Standards (USS). Some well know bar code schemes include UPC and UCC/EAN-128, Codabar developed by Pitney Bowes Corporation, 12 of 5 and Code 128 developed by Computer Identics, Code 39 (or 3 of 9) developed by Intermec Corporation, and code 93.




Some bar codes, such as UPC, are fixed length, while others are variable length. Some support only numbers, while others support alphanumeric strings (e.g., Code 39 supports full ASCII character set). Some incorporate error checking functionality.




While the bar codes listed above are generally one-dimensional in that they consist of a linear string of bars, bar codes may also be two-dimensional. Two dimensional bar codes may be in a stacked form (e.g., a vertical stacking of one-dimensional codes), a matrix form, a circular form, or some other two-dimensional pattern. Some examples of 2D barcodes include code 49, code 16k, Data Matrix developed by RVSI, QR code, micro PDF-417 and PDF-417.




For more information on bar codes, see D. J. Collins, N. N. Whipple, Using Bar Code-Why It's Taking Over, (2d ed.) Data Capture Institute; R. C. Palmer, The Bar Code Book, (3


rd


ed.) Helmers Publishing, Inc., and P. L. Grieco, M. W. Gozzo, C. J. Long, Behind Bars, Bar Coding Principles and Applications, PT Publications Inc., which are herein incorporated by reference.




A hidden, out-of-phase image can include a barcode. Consider the vast possibilities. A barcode is often disdained for aesthetic reasons, but a hidden, out-of-phase barcode can carry relatively large amounts of information while remaining virtually imperceptible. In one implementation, a barcode is redundantly hidden or titled throughout media using our out-of-phase embedding techniques. This allows for robust barcode detection even if only a portion of the media is recoverable. In another implementation one or more barcodes are placed in predetermined areas throughout the image. In still another implementation, a barcode reader, such as those provided by Symbol (e.g., the VS4000 and P300IMG models) or Welch Allyn (e.g., the Dolphin model), is augmented with an infrared illumination source and/or IR-filters. Once illuminated, the barcode reader detects and decodes a barcode hidden in a K channel.




Fiducials and Orientation Signal




In some digital watermarking techniques, the components of the digital watermark structure may perform the same or different functions. For example, one component may carry a message, while another component may serve to identify the location or orientation of the watermark in a signal. This orientation component is helpful in resolving signal distortion issues such as rotation, scale and translation. (Further reference to orientation signals can be made, e.g., to previously mentioned application Ser. No. 09/503,881.). In some cases, channel capacity is congested by an orientation signal.




One improvement is to embed an orientation signal using our out-of-phase hiding techniques. The message component of a digital watermark can then be embedded using out-of-phase or non-out-of-phase embedding techniques. This improvement will increase message capacity, while improving visibility considerations. Scale, orientation, and image translation can be resolved based on the orientation of the fiducial.




A related improvement embeds a plurality of fiducials or orientation markers


54


in an out-of-phase channel of media


12


(FIG.


13


). A watermark detection module detects the fiducials to identify distortion.




Spot Colors




We have found that our inventive techniques are not limited to process colors. Indeed, our out-of-phase techniques can be extended to spot colors. (See Assignee's U.S. patent application Ser. No. 10/074,677, filed Feb. 11, 2002, for a further discussion of spot colors and digitally watermarking spot colors. The Ser. No. 10/074,677 application is herein incorporated by reference.). With reference to

FIG. 14

, and preferably (but not limited to) relatively darker spot colors, e.g., violets, blues, etc., we counteract a watermark signal (or image) embedded in the spot color channel with an inverted signal in a K channel. Preferably, the K channel base intensity is subtle (e.g., 0% as represented by the K channel base level dashed line in

FIG. 14

) in comparison to the base level spot color intensity (e.g., 100% intensity as represented by the spot color maximum level dashed line in FIG.


14


). The watermark signal (or image) signal is embedded through a combination of negative spot color tweaks and positive, offsetting, K channel tweaks. Infrared illumination facilitates detection of the K-channel watermark tweaks. (Embedding a spot color need not be limited to negative tweaks. Indeed, if the spot color is not at 100% intensity, positive spot color tweaks and corresponding negative K channel tweaks can facilitate embedding.).




Paper Information and Printing Processes




Another improvement is to carry printing process information and/or paper characteristics with a digital watermark. For example, a digital watermark may include signal gain or embedding characteristics that are specific to a printing press, printing process, process ink type or paper characteristics. The digital watermark can be embedded in a digital file, which is analyzed prior to a print run. The embedding process is adjusted according to the watermark data. Or the watermark signal can be analyzed after printing one or more test copies. The signal strength or payload metric can be analyzed to determine whether the process should be adjusted.




Our out-of-phase digital watermark can be used to detect a misalignment in a printing process. With reference to

FIG. 15

a printer


150


outputs a CMYK (or spot color, etc.) printed sheet


152


. The printed sheet includes an out-of-phase digital watermark or image hidden therein. An input device


154


captures an image of sheet


152


. Preferably, input device


154


captures a visible spectrum image of sheet


152


. The input device provides the captured image (e.g., digital scan data) to a watermark detector


156


. The watermark detector


156


analyzes the captured image in search of the embedded out-of-phase digital watermark. The watermark detector


156


should not be able to detect the embedded watermark if the printing of the CMY and K are aligned, due the localized cancellation of the signal tweaks (or luminance changes). The term aligned in this context implies that the CMY and K are sufficiently inverted to allow localized cancellation. A misalignment is identified if the watermark detector


156


reads the digital watermark. Such a misalignment is optionally communicated from the watermark detector


156


to the printer


150


or otherwise provided to announce the printing misalignment. Of course other alignment and color balance information can be identified from the detection of the digital watermark.




Color Channel Keys




A related inventive technique embeds a key in one color channel for decoding a watermark in a second color channel. Consider an implementation where a first digital watermark is embedded in a first color channel. The first digital watermark includes a payload including a key. The key is used to decode a digital watermark embedded in a second color plane. The term decode in this context includes providing a reference point to locate the second watermark, providing a key to unlock, decrypt, decode or unscramble the second digital watermark payload, etc. Of course this inventive technique is not limited to our out-of-phase digital watermarks.




Fragile Security




Our out-of-phase hiding techniques are fragile since a signal processing operation that combines the K channel with the CMY channels effectively cancels the hidden signal. A fragile watermark is one that is lost or degrades predictably with signal processing. Conversion to other color spaces similarly degrades the watermark signal. Take a typical scan/print process for example. Digital scanners typically have RGB image sensors to measure the image color. Scanning an out-of-phase embedded CMYK image degrades the embedded watermark due to the combination of K with CMY in a local area, effectively canceling the watermark. When the RGB image representation is converted to CMYK and printed, the watermark signal is effectively lost. Similarly, other conversions, such as to a L*a*b color space, degrade the out-of-phase watermark due to the combination of K with CMY throughout local areas. Nevertheless, the watermark signal is detectable from an original CMYK media, since the K channel can be detected separately by viewing, e.g., in the near infrared.




A fragile watermark has utility in many applications. Take counterfeiting, for example. The inventive fragile watermark is embedded in original CMYK media. If the media is copied, the embedded fragile watermark is either lost or degrades predictably. The copy is recognized as a copy (or counterfeit) by the absence or degradation of the fragile watermark. Fragile watermarks can also be used in conjunction with other watermarks, such as robust watermarks. The fragile watermark announces a copy or counterfeit by its absence or degradation, while the other robust watermark identifies author, source, links and/or conveys metadata or other information, etc. In other embodiments, a fragile watermark is an enabler. For example, some fragile watermarks may include plural-bit data that is used to enable a machine, allow access to a secure computer area, verify authenticity, and/or link to information. This plural-bit data is lost or sufficiently degrades in a copy, preventing the enabling functions.




Another inventive feature is to embed a hash or other representation of a product (e.g., product code or serial number) in a digital watermark payload or message. The digital watermark is then tied or linked directly to the product. If the product includes a barcode having the product code, such can be compared with the digital watermark.




Conclusion




Preferably, an out-of phase watermark signal is embedded 180 degrees out-of-phase with corresponding channels. However, some cancellation will still be achieved if the signal is approximately 180 degrees, for example, in a range of ±0-50% from the 180-degree mark. The term “inverted” includes values within this range. We note that while the present invention has been described with respect to CMYK process inks, the present invention is not so limited. Indeed, our inventive techniques can be applied to printing processes using more than four inks with the K channel canceling the three or more color channels. Similarly, as shown above under the spot color discussion, our inventive techniques are also applicable to printing processes using less than four inks. Of course our techniques can be used with a variety of printing techniques, including offset printing, dye diffusion thermal transfer (D2T2), other thermal transfers, process ink printing, etc., etc., etc.




The section headings in this application are provided merely for the reader's convenience, and provide no substantive limitations. Of course, the disclosure under one section heading may be readily combined with the disclosure under another section heading.




To provide a comprehensive disclosure without unduly lengthening this specification, the above-mentioned patents and patent applications are hereby incorporated by reference, along with U.S. patent application Ser. No. 09/694,465, filed Oct. 22, 2000. The particular combinations of elements and features in the above-detailed embodiments are exemplary only; the interchanging and substitution of these teachings with other teachings in this application and the incorporated-by-reference patents/applications are also contemplated.




The above-described methods and functionality can be facilitated with computer executable software stored on computer readable media, such as electronic memory circuits, RAM, ROM, magnetic media, optical media, memory sticks, hard disks, removable media, etc., etc. Such software may be stored and executed on a general purpose computer, or on a server for distributed use. Data structures representing the various luminance values, out-of-phase embedded signals, embedded color planes, color signals, data signals, luminance signals, etc., may also be stored on such computer readable media. Also, instead of software, a hardware implementation, or a software-hardware implementation can be used.




In view of the wide variety of embodiments to which the principles and features discussed above can be applied, it should be apparent that the detailed embodiments are illustrative only and should not be taken as limiting the scope of the invention. Rather, we claim as our invention all such modifications as may come within the scope and spirit of the following claims and equivalents thereof.



Claims
  • 1. A method to detect a first image hidden in a second image, the second image comprising a plurality of color channels, wherein the hiding of the first image in the second image comprises at least hiding a first image component in a first of the plurality of color channels, and in the same second image location, hiding the component in a second of the plurality of channels, the second channel component being inverted with respect to the first channel component, said method comprising:illuminating the embedded second image with infrared light; capturing a digital image of the illuminated second image; and analyzing the captured illuminated digital image to detect the first image.
  • 2. The method according to claim 1, wherein the first image comprises at least one of a photograph, graphic, logo, barcode, digital watermark, image, text, message and orientation fiducial.
  • 3. The method according to claim 2, wherein the first color channel comprises black, and the second color channel comprises cyan, magenta and yellow channels, wherein the second channel component is embedded in each of the cyan, magenta and yellow components, the second channel component being inverted in each of the cyan, magenta and yellow channels with respect to the first channel component.
  • 4. The method according to claim 2, wherein the first color channel comprises black and the second color channel comprises cyan, magenta and yellow channels.
  • 5. The method according to claim 4, wherein at least said black color channel conforms to standard web offset press (SWOP) standards.
  • 6. The method according to claim 2, wherein the first color channel comprises black, and the second color channel comprises a spot color.
  • 7. The method of claim 2, wherein the inverted nature of the second channel component with respect to the first channel component cancels localized luminance attributable to the hiding of the first channel component.
  • 8. The method according to claim 1, further comprising shielding the media from visible light.
  • 9. The method according to claim 1, further comprising the step of filtering visible light before said step of capturing a digital image.
  • 10. A method to detect a digital watermark embedded in media, wherein the media includes a plurality of color planes and the digital watermark includes at least a first component and a second component, wherein the second component is embedded in a second color plane at a first media location so as to be inverted in the same media location with respect to the first component embedded in a first color plane so as to cancel luminance attributable to the first component, said method comprising illuminating the media with infrared light or ultraviolet light, and detecting the digital watermark from the illuminated media.
  • 11. The method according to claim 10, wherein the plurality of color planes includes at least a black color plane and the second component is embedded in the black color plane.
  • 12. A method of detecting an orientation fiducial steganographically hidden in a second image to help resolve image distortion, the second image comprising a plurality of color channels, wherein the hiding of the orientation fiducial in the second image comprises hiding the fiducial in a first of the plurality of color channels, and hiding the fiducial in a second of the plurality of channels at the same location as the hidden first channel fiducial, the second channel fiducial being inverted with respect to the first channel fiducial so as to cancel localized luminance attributable to the first channel fiducial, said method comprising the steps of illuminating the second image with infrared light, capturing a digital image of the illuminated second image, and analyzing the captured illuminated digital image to detect the fiducial.
  • 13. The method of claim 12, wherein the fiducial comprises an indication of an original scale and orientation of at least one of the orientation fiducial and second image.
  • 14. The method of claim 13, further comprising comparing the orientation and scale of the detected fiducial to an expected orientation and scale to rescale and reorient the second image.
  • 15. The method of claim 15, wherein said image further comprises a third channel with the fiducial hidden therein at the same spatial location as the hidden first channel fiducial, the image further comprising a fourth channel with the fiducial hidden therein at the same spatial location as the hidden first channel fiducial, wherein the second channel fiducial is inverted with respect to the third channel fiducial and the fourth channel fiducial so as to cancel at least some localized liminance attibutable to the third channel fiducial and fourth channel fiducial.
  • 16. A method to detect a digital watermark embedded in printed media, wherein the printed media includes a plurality of color planes and the digital watermark includes at least a first component and a second component, wherein the second component is embedded so as to visually effect a first spatial area, wherein the embedded second embodiment component reduces at least some visual artifacts at the first spatial area that are attributable to the embedded first component, said method comprising illuminating the media at least one of infrared light and ultraviolet light, and detecting the digital watermark from an image captured from the illuminated media.
  • 17. The method according to claim 16, wherein the plurality of color planes includes at least a black color plane and the second component is embedded in the black color plane.
  • 18. The method of claim 17, wherein the plurality of color planes includes a cyan color plane, a magenta color plane and a yellow color plane, and the first component is embedded in each of the cyan color plane, magenta color plane and yellow color plane.
  • 19. The method of claim 18, wherein the first component is embedded at different strengths in at least one of the cyan color plane, magenta color plane and yellow color plane.
  • 20. The method of claim 16, wherein the visual artifacts comprise a change in luminance that is attributable to the embedded first component.
  • 21. A method to detect a first image hidden in a second image, the second image comprising a plurality of color channels, wherein the hiding of the first image in the second image comprises at least hiding a first image component in a first of the plurality of color channels, and hiding the component in a second of the plurality of channels, the second channel component being hidden so as to be spatially registered with the first image component to reduce at least some visual artifacts that are attributable to the first image component, said method comprising;illuminating the second image with at least of infrared light and ultraviolet light; optically capturing an image of the illuminated second image; and analyzing the captured illuminated image to detect the first image component.
  • 22. The method according to claim 21, wherein the second color channel comprises black, and the first color channel comprises cyan, magenta and yellow channels, wherein the first image component is embedded in each of the cyan, magenta and yellow channels, the second image component being spatially registered with the first image components to reduce at least some visual artifacts that are attributable to the first image component in each of the cyan, magenta and yellow channels.
  • 23. The method of claim 21, wherein the second channel component is hidden so as to be spatially registered with the first image component to cancel at least some localized luminance that is attributable to the hiding of the first image component.
  • 24. The method according to claim 21, wherein the first image comprises at least one of a photograph, graphic, logo, barcode, digital watermark, image, text, message and orientation fiducial.
RELATED APPLICATION DATA

This application is a continuation in part of U.S. patent application Ser. No. 09/945,243, filed Aug. 31, 2001. The Ser. No. 09/945,243 application is a continuation in part of U.S. patent application Ser. No. 09/933,863, filed Aug. 20, 2001. The Ser. No. 09/933,863 application is a continuation in part of U.S. patent application Ser. No. 09/898,901, filed Jul. 2, 2001, which is a continuation in part of U.S. patent application Ser. No. 09/553,084, filed Apr. 19, 2000. This application is also a continuation in part of U.S. patent application Ser. No. 10/094,593, titled “Identification Document Including Embedded Data,” filed Mar. 6, 2002, which claims the benefit of U.S. Provisional Application No. 60/356,881, filed Feb. 12, 2002. This application is also related to “Enhancing Embedding Of Out-Of-Phase Signals” and “Hiding Information Out-Of-Phase In Color Channels”, each filed concurrently herewith. Each of the above U.S. patent applications is herein incorporated by reference.

US Referenced Citations (438)
Number Name Date Kind
3493674 Houghton Feb 1970 A
3569619 Simijian Mar 1971 A
3576369 Wick et al. Apr 1971 A
3585290 Sanford Jun 1971 A
3655162 Yamamoto et al. Apr 1972 A
3703628 Philipson, Jr. Nov 1972 A
3809806 Walker et al. May 1974 A
3838444 Loughlin et al. Sep 1974 A
3914877 Hines Oct 1975 A
3922074 Ikegami et al. Nov 1975 A
3971917 Maddox et al. Jul 1976 A
3977785 Harris Aug 1976 A
3982064 Barnaby Sep 1976 A
3984624 Waggener Oct 1976 A
4025851 Haselwood et al. May 1977 A
4184700 Greenaway Jan 1980 A
4225967 Miwa et al. Sep 1980 A
4230990 Lert, Jr. et al. Oct 1980 A
4231113 Blasbalg Oct 1980 A
4238849 Gassmann Dec 1980 A
4252995 Schmidt et al. Feb 1981 A
4262329 Bright et al. Apr 1981 A
4296326 Haslop et al. Oct 1981 A
4297729 Steynor et al. Oct 1981 A
4313197 Maxemchuk Jan 1982 A
4367488 Leventer et al. Jan 1983 A
4379947 Warner Apr 1983 A
4380027 Leventer et al. Apr 1983 A
4389671 Posner et al. Jun 1983 A
4395600 Lundy et al. Jul 1983 A
4416001 Ackerman Nov 1983 A
4423415 Goldman Dec 1983 A
4425642 Moses et al. Jan 1984 A
4476468 Goldman Oct 1984 A
4504084 Jauch Mar 1985 A
4523508 Ruell Jun 1985 A
4528588 Löfberg Jul 1985 A
4547804 Greenberg Oct 1985 A
4553261 Froessl Nov 1985 A
4590366 Rothfjell May 1986 A
4595950 Lofberg Jun 1986 A
4618257 Bayne et al. Oct 1986 A
4637051 Clark Jan 1987 A
4639779 Greenberg Jan 1987 A
4647974 Butler et al. Mar 1987 A
4654867 Labedz et al. Mar 1987 A
4660221 Dlugos Apr 1987 A
4663518 Borror et al. May 1987 A
4665431 Cooper May 1987 A
4672605 Hustig et al. Jun 1987 A
4675746 Tetrick et al. Jun 1987 A
4677435 D'Agraives et al. Jun 1987 A
4682794 Margolin Jul 1987 A
4703476 Howard Oct 1987 A
4712103 Gotanda Dec 1987 A
4718106 Weinblatt Jan 1988 A
4723149 Harada Feb 1988 A
4725462 Kimura Feb 1988 A
4739377 Allen Apr 1988 A
4750173 Bluthgen Jun 1988 A
4765656 Becker et al. Aug 1988 A
4775901 Nakano Oct 1988 A
4776013 Kafri et al. Oct 1988 A
4805020 Greenberg Feb 1989 A
4807031 Broughton et al. Feb 1989 A
4811357 Betts et al. Mar 1989 A
4811408 Goldman Mar 1989 A
4820912 Samyn Apr 1989 A
4835517 van der Gracht et al. May 1989 A
4855827 Best Aug 1989 A
4864618 Wright et al. Sep 1989 A
4866771 Bain Sep 1989 A
4874936 Chandler et al. Oct 1989 A
4876617 Best et al. Oct 1989 A
4879747 Leighton et al. Nov 1989 A
4884139 Pommier Nov 1989 A
4885632 Mabey et al. Dec 1989 A
4888798 Earnest Dec 1989 A
4903301 Kondo et al. Feb 1990 A
4908836 Rushforth et al. Mar 1990 A
4908873 Philibert et al. Mar 1990 A
4918484 Ujiie et al. Apr 1990 A
4920503 Cook Apr 1990 A
4921278 Shiang et al. May 1990 A
4939515 Adelson Jul 1990 A
4941150 Iwasaki Jul 1990 A
4943973 Werner Jul 1990 A
4943976 Ishigaki Jul 1990 A
4944036 Hyatt Jul 1990 A
4947028 Gorog Aug 1990 A
4963998 Maufe Oct 1990 A
4965827 McDonald Oct 1990 A
4967273 Greenberg Oct 1990 A
4969041 O'Grady et al. Nov 1990 A
4972471 Gross et al. Nov 1990 A
4972475 Sant' Anselmo Nov 1990 A
4972476 Nathans Nov 1990 A
4977594 Shear Dec 1990 A
4979210 Nagata et al. Dec 1990 A
4996530 Hilton Feb 1991 A
5003590 Lechner et al. Mar 1991 A
5010405 Schreiber et al. Apr 1991 A
5023907 Johnson Jun 1991 A
5027401 Soltesz Jun 1991 A
5034982 Heninger et al. Jul 1991 A
5036513 Greenblatt Jul 1991 A
5040059 Leberl Aug 1991 A
5051835 Bruehl et al. Sep 1991 A
5053956 Donald Oct 1991 A
5062666 Mowry et al. Nov 1991 A
5063446 Gibson Nov 1991 A
5073899 Collier et al. Dec 1991 A
5073925 Nagata et al. Dec 1991 A
5075773 Pullen et al. Dec 1991 A
5077608 Dubner Dec 1991 A
5077795 Rourke et al. Dec 1991 A
5079648 Maufe Jan 1992 A
5091966 Bloomberg et al. Feb 1992 A
5093147 Andrus et al. Mar 1992 A
5095196 Miyata Mar 1992 A
5103459 Gilhousen et al. Apr 1992 A
5113437 Best May 1992 A
5113445 Wang May 1992 A
5128525 Stearns et al. Jul 1992 A
5144660 Rose Sep 1992 A
5146457 Veldhuis et al. Sep 1992 A
5148498 Resnikoff et al. Sep 1992 A
5150409 Elsner Sep 1992 A
5161210 Druyvesteyn et al. Nov 1992 A
5166676 Milheiser Nov 1992 A
5168146 Bloomberg Dec 1992 A
5181786 Hujink Jan 1993 A
5185736 Tyrrell et al. Feb 1993 A
5199081 Saito et al. Mar 1993 A
5200822 Bronfin et al. Apr 1993 A
5212551 Conanan May 1993 A
5213337 Sherman May 1993 A
5216724 Suzuki et al. Jun 1993 A
5228056 Schilling Jul 1993 A
5243411 Shirochi et al. Sep 1993 A
5243423 DeJean et al. Sep 1993 A
5245165 Zhang Sep 1993 A
5245329 Gokcebay Sep 1993 A
5247364 Banker et al. Sep 1993 A
5253078 Balkanski et al. Oct 1993 A
5257119 Funada et al. Oct 1993 A
5259025 Monroe Nov 1993 A
5267334 Normille et al. Nov 1993 A
5280537 Sugiyama et al. Jan 1994 A
5288976 Citron Feb 1994 A
5291243 Heckman et al. Mar 1994 A
5293399 Hefti Mar 1994 A
5295203 Krause et al. Mar 1994 A
5299019 Pack et al. Mar 1994 A
5305400 Butera Apr 1994 A
5315098 Tow May 1994 A
5315416 Taniuchi et al. May 1994 A
5319453 Copriviza et al. Jun 1994 A
5319724 Blonstein et al. Jun 1994 A
5319735 Preuss et al. Jun 1994 A
5321470 Hasuo et al. Jun 1994 A
5325167 Melen Jun 1994 A
5327237 Gerdes et al. Jul 1994 A
5337362 Gormish et al. Aug 1994 A
5349655 Mann Sep 1994 A
5351302 Leighton et al. Sep 1994 A
5371792 Asai et al. Dec 1994 A
5374976 Spannenburg Dec 1994 A
5379345 Greenberg Jan 1995 A
5385371 Izawa Jan 1995 A
5387941 Montgomery et al. Feb 1995 A
5394274 Kahn Feb 1995 A
5396559 McGrew Mar 1995 A
5398283 Virga Mar 1995 A
5404160 Schober et al. Apr 1995 A
5404377 Moses Apr 1995 A
5408542 Callahan Apr 1995 A
5416307 Danek et al. May 1995 A
5418853 Kanota et al. May 1995 A
5422963 Chen et al. Jun 1995 A
5422995 Aoki et al. Jun 1995 A
5425100 Thomas et al. Jun 1995 A
5428606 Moskowitz Jun 1995 A
5428607 Hiller et al. Jun 1995 A
5428731 Powers Jun 1995 A
5432542 Thibadeau et al. Jul 1995 A
5432870 Schwartz Jul 1995 A
5446488 Leslie Aug 1995 A
5450122 Keene Sep 1995 A
5450490 Jensen et al. Sep 1995 A
5461426 Limberg et al. Oct 1995 A
5463209 Figh Oct 1995 A
5469222 Sprague Nov 1995 A
5469506 Berson et al. Nov 1995 A
5473631 Moses Dec 1995 A
5479168 Johnson et al. Dec 1995 A
5481294 Thomas et al. Jan 1996 A
5481377 Udagawa et al. Jan 1996 A
5488664 Shamir Jan 1996 A
5493677 Balogh et al. Feb 1996 A
5495581 Tsai Feb 1996 A
5496071 Walsh Mar 1996 A
5499294 Friedman Mar 1996 A
5502576 Ramsay et al. Mar 1996 A
5515081 Vasilik May 1996 A
5521722 Colvill et al. May 1996 A
5524933 Kunt et al. Jun 1996 A
5530751 Morris Jun 1996 A
5530759 Braudaway et al. Jun 1996 A
5530852 Meske, Jr. et al. Jun 1996 A
5532920 Hartrick et al. Jul 1996 A
5537223 Curry Jul 1996 A
5539471 Myhrvold et al. Jul 1996 A
5539735 Moskowitz Jul 1996 A
5541662 Adams et al. Jul 1996 A
5544255 Smithies et al. Aug 1996 A
5548646 Aziz et al. Aug 1996 A
5557333 Jungo et al. Sep 1996 A
5557412 Saito et al. Sep 1996 A
5559559 Jungo et al. Sep 1996 A
5568179 Diehl et al. Oct 1996 A
5568550 Ur Oct 1996 A
5568555 Shamir Oct 1996 A
5568570 Rabbani Oct 1996 A
5572010 Petrie Nov 1996 A
5572247 Montgomery Nov 1996 A
5576532 Hecht Nov 1996 A
5579124 Aijala et al. Nov 1996 A
5582103 Tanaka et al. Dec 1996 A
5587743 Montgomery Dec 1996 A
5590197 Chen et al. Dec 1996 A
5594226 Steger Jan 1997 A
5598526 Daniel et al. Jan 1997 A
5602920 Bestler et al. Feb 1997 A
5606609 Houser et al. Feb 1997 A
5611575 Petrie Mar 1997 A
5613004 Cooperman et al. Mar 1997 A
5613012 Hoffman et al. Mar 1997 A
5614940 Cobbley et al. Mar 1997 A
5617119 Briggs et al. Apr 1997 A
5617148 Montgomery Apr 1997 A
5621810 Suzuki et al. Apr 1997 A
5629770 Brassil May 1997 A
5629980 Stefik et al. May 1997 A
5636292 Rhoads Jun 1997 A
5636874 Singer Jun 1997 A
5638443 Stefik Jun 1997 A
5638446 Rubin Jun 1997 A
5640193 Wellner Jun 1997 A
5646997 Barton Jul 1997 A
5646999 Saito Jul 1997 A
5652626 Kawakami et al. Jul 1997 A
5659164 Schmid Aug 1997 A
5659628 Tachikawa et al. Aug 1997 A
5659726 Sandford et al. Aug 1997 A
5661574 Kawana Aug 1997 A
5663766 Sizer, II Sep 1997 A
5664018 Leighton Sep 1997 A
5665951 Newman et al. Sep 1997 A
5666487 Goodman et al. Sep 1997 A
5668636 Beach et al. Sep 1997 A
5671282 Wolff et al. Sep 1997 A
5673316 Auerbach et al. Sep 1997 A
5687236 Moskowitz et al. Nov 1997 A
5689623 Pinard Nov 1997 A
5696594 Saito et al. Dec 1997 A
5710636 Curry Jan 1998 A
5719939 Tel Feb 1998 A
5721788 Powell et al. Feb 1998 A
5727092 Sandford, II et al. Mar 1998 A
5735547 Morelle et al. Apr 1998 A
5740244 Indeck et al. Apr 1998 A
5742845 Wagner Apr 1998 A
5745604 Rhoads Apr 1998 A
5748763 Rhoads May 1998 A
5760386 Ward Jun 1998 A
5761686 Bloomberg Jun 1998 A
5768426 Rhoads Jun 1998 A
5778102 Sandford, II et al. Jul 1998 A
5787186 Schroeder Jul 1998 A
5788285 Wicker Aug 1998 A
5790693 Graves et al. Aug 1998 A
5790697 Munro et al. Aug 1998 A
5790703 Wang Aug 1998 A
5804803 Cragun et al. Sep 1998 A
5809139 Girod et al. Sep 1998 A
5809160 Powell et al. Sep 1998 A
5809317 Kogan et al. Sep 1998 A
5817205 Kaule Oct 1998 A
5818441 Throckmorton et al. Oct 1998 A
5819289 Sanford, II et al. Oct 1998 A
5822436 Rhoads Oct 1998 A
5825871 Mark Oct 1998 A
5825892 Braudaway et al. Oct 1998 A
5832186 Kawana Nov 1998 A
5838458 Tsai Nov 1998 A
5841978 Rhoads Nov 1998 A
5848144 Ahrens Dec 1998 A
5848413 Wolff Dec 1998 A
5852673 Young Dec 1998 A
5857038 Owada et al. Jan 1999 A
5862218 Steinberg Jan 1999 A
5862260 Rhoads Jan 1999 A
5869819 Knowles et al. Feb 1999 A
5871615 Harris Feb 1999 A
5872589 Morales Feb 1999 A
5875249 Mintzer et al. Feb 1999 A
5893101 Balogh et al. Apr 1999 A
5898779 Squilla et al. Apr 1999 A
5900608 Iida May 1999 A
5902353 Reber et al. May 1999 A
5903729 Reber et al. May 1999 A
5905248 Russell et al. May 1999 A
5905251 Knowles May 1999 A
5905800 Moskowitz et al. May 1999 A
5905810 Jones et al. May 1999 A
5905819 Daly May 1999 A
5913210 Call Jun 1999 A
5915027 Cox et al. Jun 1999 A
5919730 Gasper et al. Jul 1999 A
5930369 Cox et al. Jul 1999 A
5930767 Reber et al. Jul 1999 A
5932863 Rathus et al. Aug 1999 A
5933798 Linnartz Aug 1999 A
5933829 Durst et al. Aug 1999 A
5938726 Reber et al. Aug 1999 A
5938727 Ikeda Aug 1999 A
5939695 Nelson Aug 1999 A
5940595 Reber et al. Aug 1999 A
5946414 Cass et al. Aug 1999 A
5949055 Fleet et al. Sep 1999 A
5950173 Perkowski Sep 1999 A
5951055 Mowry, Jr. Sep 1999 A
5960081 Vynne et al. Sep 1999 A
5960103 Graves et al. Sep 1999 A
5963916 Kaplan Oct 1999 A
5971277 Cragun et al. Oct 1999 A
5974141 Saito Oct 1999 A
5974548 Adams Oct 1999 A
5978013 Jones et al. Nov 1999 A
5978773 Hudetz et al. Nov 1999 A
5979757 Tracy et al. Nov 1999 A
5983218 Syeda-Mahmoo Nov 1999 A
5991426 Cox et al. Nov 1999 A
6005501 Wolosewicz Dec 1999 A
6024287 Takai et al. Feb 2000 A
6035177 Moses et al. Mar 2000 A
6045656 Foster et al. Apr 2000 A
6046808 Fateley Apr 2000 A
6052486 Knowlton et al. Apr 2000 A
6054021 Kurrle et al. Apr 2000 A
6064764 Bhaskaran et al. May 2000 A
6094483 Fridrich et al. Jul 2000 A
6104812 Koltai et al. Aug 2000 A
6122403 Rhoads Sep 2000 A
6324574 Rhoads Sep 2000 B1
6128411 Knox Oct 2000 A
6136752 Paz-Pujalt et al. Oct 2000 A
6166750 Negishi Dec 2000 A
6185312 Nakamura et al. Feb 2001 B1
6185683 Ginter et al. Feb 2001 B1
6188787 Ohmae et al. Feb 2001 B1
6192138 Yamadaji Feb 2001 B1
6201879 Bender et al. Mar 2001 B1
6205249 Moskowitz Mar 2001 B1
6233347 Chen et al. May 2001 B1
6233684 Stefik et al. May 2001 B1
6234537 Gurmann et al. May 2001 B1
6243480 Zhao et al. Jun 2001 B1
6246777 Agarwal et al. Jun 2001 B1
6266430 Rhoads et al. Jul 2001 B1
6272176 Srinivasan Aug 2001 B1
6272248 Saitoh et al. Aug 2001 B1
6272634 Tewfik et al. Aug 2001 B1
6281165 Cranford Aug 2001 B1
6285776 Rhoads Sep 2001 B1
6301360 Bocionek et al. Oct 2001 B1
6304345 Patton et al. Oct 2001 B1
6311214 Rhoads Oct 2001 B1
6314192 Chen et al. Nov 2001 B1
6320675 Sakaki et al. Nov 2001 B1
6321648 Berson et al. Nov 2001 B1
6321981 Ray et al. Nov 2001 B1
6332031 Rhoads et al. Dec 2001 B1
6332194 Bloom et al. Dec 2001 B1
6334187 Kadono Dec 2001 B1
6343204 Yang Jan 2002 B1
6356363 Cooper et al. Mar 2002 B1
6359985 Koch et al. Mar 2002 B1
6373965 Liang Apr 2002 B1
6390362 Martin May 2002 B1
6394358 Thaxton et al. May 2002 B1
6404926 Miyahara et al. Jun 2002 B1
6438251 Yamaguchi Aug 2002 B1
6481753 Van Boom et al. Nov 2002 B2
6647125 Matsumoto et al. Nov 2003 B2
6650773 Maurer et al. Nov 2003 B1
6651121 Zurawski et al. Nov 2003 B1
20010014169 Liang Aug 2001 A1
20010017709 Murakami et al. Aug 2001 A1
20010021144 Oshima et al. Sep 2001 A1
20010024510 Iwamura Sep 2001 A1
20010026377 Ikegami Oct 2001 A1
20010026629 Oki Oct 2001 A1
20010028727 Naito et al. Oct 2001 A1
20010030759 Hayashi et al. Oct 2001 A1
20010030761 Ideyahma Oct 2001 A1
20010033674 Chen et al. Oct 2001 A1
20010037313 Lofgren et al. Nov 2001 A1
20010037455 Lawandy et al. Nov 2001 A1
20010040980 Yamaguchi Nov 2001 A1
20010052076 Kadono Dec 2001 A1
20010053235 Sato Dec 2001 A1
20010053299 Matsunoshita et al. Dec 2001 A1
20010054644 Liang Dec 2001 A1
20020003891 Hoshino Jan 2002 A1
20020009208 Alattar et al. Jan 2002 A1
20020015509 Nakamura et al. Feb 2002 A1
20020018228 Torigoe Feb 2002 A1
20020018879 Barnhart et al. Feb 2002 A1
20020021824 Reed et al. Feb 2002 A1
20020023218 Lawandy et al. Feb 2002 A1
20020027612 Brill et al. Mar 2002 A1
20020027674 Tokunaga et al. Mar 2002 A1
20020031241 Kawaguchi et al. Mar 2002 A1
20020040433 Kondo Apr 2002 A1
20020051237 Ohara May 2002 A1
20020057431 Fateley et al. May 2002 A1
20020067844 Reed et al. Jun 2002 A1
20020073317 Hars Jun 2002 A1
20020080396 Silverbrook et al. Jun 2002 A1
20020099943 Rodriguez et al. Jul 2002 A1
20020118394 McKinley et al. Aug 2002 A1
20020163633 Cohen Nov 2002 A1
20030005304 Lawandy et al. Jan 2003 A1
20030012562 Lawandy et al. Jan 2003 A1
20030032033 Anglin et al. Feb 2003 A1
20030056104 Carr et al. Mar 2003 A1
Foreign Referenced Citations (75)
Number Date Country
2235002 Dec 1998 CA
2943436 May 1981 DE
3806411 Sep 1989 DE
19521969 Feb 1997 DE
366381 Oct 1989 EP
372 601 Jun 1990 EP
411 232 Feb 1991 EP
418 964 Mar 1991 EP
441 702 Aug 1991 EP
493 091 Jul 1992 EP
058 482 Aug 1992 EP
551 016 Jul 1993 EP
581 317 Feb 1994 EP
590884 Apr 1994 EP
605 208 Jul 1994 EP
642060 Mar 1995 EP
649 074 Apr 1995 EP
705022 Apr 1996 EP
705 025 Apr 1996 EP
711061 May 1996 EP
0789480 Aug 1997 EP
872995 Oct 1998 EP
642060 Apr 1999 EP
991047 Feb 2000 EP
1077570 Feb 2001 EP
1122939 Aug 2001 EP
1137244 Sep 2001 EP
1152592 Nov 2001 EP
1173001 Jan 2002 EP
1209897 May 2002 EP
1534403 Dec 1978 GB
2063018 May 1981 GB
2067871 Jul 1981 GB
2196167 Apr 1988 GB
2204984 Nov 1988 GB
2360659 Sep 2001 GB
4-248771 Feb 1992 JP
5-242217 Sep 1993 JP
07093567 Apr 1995 JP
07108786 Apr 1995 JP
8-30759 Feb 1996 JP
WO 8908915 Sep 1989 WO
WO 9325038 Dec 1993 WO
WO9427228 Nov 1994 WO
WO9504665 Feb 1995 WO
WO9510813 Apr 1995 WO
WO 9510835 Apr 1995 WO
WO9513597 May 1995 WO
WO 9514289 May 1995 WO
WO 9520291 Jul 1995 WO
WO9603286 Feb 1996 WO
WO 9627259 May 1996 WO
WO 9626494 Aug 1996 WO
WO9743736 Nov 1997 WO
WO9814887 Apr 1998 WO
WO 9820642 May 1998 WO
WO9824050 Jun 1998 WO
WO9840823 Sep 1998 WO
WO9849813 Nov 1998 WO
WO9934277 Jul 1999 WO
WO9936876 Jul 1999 WO
WO0044131 Jul 2000 WO
WO0105075 Jan 2001 WO
WO 0108405 Feb 2001 WO
WO0108405 Feb 2001 WO
WO0139121 May 2001 WO
WO0172030 Sep 2001 WO
WO0173997 Oct 2001 WO
WO 0180169 Oct 2001 WO
WO0197175 Dec 2001 WO
WO01971281 Dec 2001 WO
WO0219269 Mar 2002 WO
WO0221846 Mar 2002 WO
WO0223481 Mar 2002 WO
WO0188883 Nov 2002 WO
Non-Patent Literature Citations (197)
Entry
Piva et al., “Exploiting the Cross-Correlation of RGB-Channels for Robust Watermarking of Color Images”, Dip. Ing. Elettronica, Univ. di Firenze, Italy, IEEE 1999, pp. 306-310.*
Kohda et al., “Digital Watermarking through CDMA Channels using Spread Spectrum Techniques”, IEEE 6th Int. Symp. on Spread Spectru Tech & Appli., NJIT, pp. 671-674.*
U.S. patent application Ser. No. 09/433,104, Rhoads et al., filed Nov. 3, 1999.
U.S. patent application Ser. No. 09/694,465, Rodriguez et al., filed Oct. 23, 2000.
Kutter et al., “Digital Signature of Color Images Using Amplitude Modulation,” SPIE vol. 3022, 1997, pp. 518-526.
Vidal et al., “Non-Noticeable Information Embedding in Color Images: Marking and Detection,” IEEE (1999), pp. 293-297.
Wang et al., “Embedding Digital Watermarks in Halftone Screens,” Security and Watermarking of Multimedia Contents II, Proc. of SPIE vol. 3971, (2000), pp. 218-227.
U.S. patent application Ser. No. 09/465,418, Rhoads et al., filed Dec. 16, 1999.
U.S. patent application Ser. No. 09/619,264, Kumar, filed Jul. 19, 2000.
U.S. patent application Ser. No. 09/562,516, Rodriguez et al., filed May 1, 2000.
U.S. patent application Ser. No. 09/503,881, Rhoads et al., filed Feb. 14, 2000.
U.S. patent application Ser. No. 09/553,084, Reed et al., filed Apr. 19, 2000.
U.S. Provisional application Ser. No. 60/082,228, Rhoads, filed Apr. 16, 1998.
U.S. Provisional application Ser. No. 60/323,148, Davis et al., filed Sep. 17, 2001.
Alattar, “‘Smart Images’ Using Digimarc's Watermarking Technology,” IS&T/SPIE's 12th Int. Symposium on Electronic Imaging, San Jose CA, Jan. 25, 2000, vol. 3971, No. 25, 10 pages.
Battialo et al., “Robust Watermarking for Images Based on Color Manipulation,” IH/99 LNCS 1768, pp. 302-317, 2000.
Bender et al., “Applications for Data Hiding,” IBM Systems Journal, vol. 39, Nos 3&4, 2000, pp. 547-568.
Bors et al., “Image Watermarking Using DCT Domain Constraints,” Proc. Int. Conf. on Image Processing, vol. 3, pp. 231-234.
Brownell, “Counterfeiters Dye Over Security Measures,” SPIE's OE Magazine, Sep. 2001, pp. 8-9.
Fleet et al., “Embedding Invisible Information in Color Images,” Proc. Int. Conf. on Image Processing, vol. 1, pp. 532-535, Oct., 1997.
Frequently Asked Questions About Digimarc Signature Technology, Aug. 1, 1995, http://www.digimarc.com, 9 pages.
“Holographic signatures for digital images,” The Seybold Report on Desktop Publishing, Aug. 1995, one page.
Hunt, “The Reproduction of Colour in Photography, Printing & Television,” 1987, pp. 588, 589 and Plate 35 (in color).
Kohda et al., “Digital Watermarking Through CDMA Channels Using Spread Spectrum Techniques,” 2000 IEEE, pp. 671-674.
Komatsu et al., “A Proposal on Digital Watermark in Document Image Communication and Its Application to Realizing a Signature,” Electronics and Communications in Japan, Part 1, vol. 73, No. 5, 1990, pp. 22-33.
Komatsu et al., “Authentication System Using Concealed Image in Telematics,” Memoirs of the School of Science & Engineering, Waseda Univ., No. 52, 1988, pp. 45-60.
ORuanaidh et al, “Watermarking Digital Images for Copyright Protection,” http://www.kalman.mee.tcd.ie/people/jjr/eva-pap.html, Feb. 2, 1996, 8 pages.
Piva et al., “Exploiting the Cross-Correlation of RGB-Channels for Robust Watermarking of Color Images,” 1999 IEEE, pp. 306-310.
U.S. Provisional application Ser. No. 60/000,442, Hudetz, filed Jun. 20, 1995.
U.S. Provisional application Ser. No. 60/082,228, Rhoads, filed Apr. 16, 1998.
U.S. Provisional application Ser. No. 60/141,763, Davis, filed Jun. 30, 1999.
U.S. Provisional application Ser. No. 60/158,015, Davis et al., filed Oct. 6, 1999.
U.S. patent application Ser. No. 09/314,648, Rodriguez et al., filed May 19, 1999.
U.S. patent application Ser. No. 09/342,688, Rodriguez et al., filed Jun. 29, 1999.
U.S. patent application Ser. No. 09/342,971, Rodriguez et al., filed Jun. 29, 1999.
U.S. patent application Ser. No. 09/679,261, Davis et al., filed Oct. 4, 2000.
U.S. patent application Ser. No. 09/562,517, Davis et al., May 1, 2000.
U.S. patent application Ser. No. 09/547,664, Rhoads et al., Apr. 12, 2000.
U.S. patent application Ser. No. 09/571,442, Rhoads et al., May 15, 2000.
U.S. patent application Ser. No. 09/858,189, Rhoads et al., May 14, 2001.
U.S. patent application Ser. No. 09/631,409, Brundage et al., Aug. 3, 2000.
U.S. patent application Ser. No. 09/452,021, Davis et al., Nov. 30, 1999.
U.S. patent application Ser. No. 09/629,401, Seder et al., Aug. 1, 2000.
U.S. patent application Ser. No. 09/473,396, Evans et al., Dec. 28, 1999.
U.S. patent application Ser. No. 09/563,664, Levy et al., May 2, 2000.
U.S. patent application Ser. No. 09/670,115, Rhoads et al., Sep. 26, 2000.
Brassil et al., Electronic Marking and Identification Techniques to Discourage Document Copying, Proceedings of INFOCOM '94 Conference on Computer, IEEE Commun. Soc Conference, Jun. 12-16, 1994, 1278-1287.
Bruckstein, A.M.; Richardson, T.J., A holographic transform domain image watermarking method, Circuits, Systems, and Signal Processing vol. 17, No. 3 pp. 361-89, 1998. This paper includes an appendix containing an internal memo of Bell Labs, which according to the authors of the paper, was dated Sep. 1994.
“High Water FBI Limited Presentation Image Copyright Protection Software,” FBI Ltd brochure, Jul., 1995, 17 pages.
Koch et al., “Copyright Protection for Multimedia Data,” Fraunhofer Institute for Computer Graphics, Dec. 16, 1994, 15 pages.
Koch et al., “Towards Robust and Hidden Image Copyright Labeling,” Proc. of 1995 IEEE Workshop on Nonlinear Signal and Image Processing, Jun. 20-22, 1995, 4 pages.
Kurak et al., “A Cautionary Note On Image Downgrading,” 1992 IEEE, pp. 153-159.
Mintzer et al., “Safeguarding Digital library Contents and Users” Digital Watermarking, D-Lib Magazine, Dec. 1997: ISSN 1082-9873.
Rindfrey, “Towards an Equitable System for Access Control and Copyright Protection in Broadcast Image Services: The Equicrypt Approach,” Intellectual Property Rights and New Technologies, Proc. of the Conference, R. Oldenbourg Verlag Wien Munchen 1995, 12 pages.
Schreiber et al., “A Compatible High-Definition Television System Using the Noise-Margin Method of Hiding Enhancement Information,” SMPTE Journal, Dec. 1989, pp. 873-879.
SDMI Example Use Scenarios (Non-Exhaustive), Version 1.2, Jun. 16, 1999.
Szepanski, “A Signal Theoretic Method for Creating Forgery-Proof Documents for Automatic Verification,” Proceedings 1979 Camahan Conference on Crime Countermeasures, May 16, 1979, pp. 101-109.
Szepanski, “Additive Binary Data Transmission for Video Signals,” Papers Presented at Conf. Of Comm. Engineering Soc. Sep. 30 -Oct. 3, 1980, Technical Reports vol. 74, pp. 342-352.
Tanaka et al., “A Visual Retrieval System with Private Information for Image Database,” Proceeding International Conference on DSP Applications and Technology, Oct. 1991, pp. 415-421.
Tanaka et al., “New Integrated Coding Schemes for Computer-Aided Facsimile,” Proc. IEEE Int'l Conf. on Sys. Integration, Apr. 1990, pp. 275-281.
Tirkel et al, “Electronic Water Mark,” DICTA-93, Macquarie University, Syndney, Australia, Dec., 1993, pp. 666-673.
Weber et al., “Correlative Image Registration,” Seminars in Nuclear Medicine, vol XXIV, No. 4, Oct., 1994, pp. 311-323.
Szepanski, “A Signal Theoretic Method for Creating Forgery-Proof Documents for Automatic Verification,” Proceedings 1979 Carnahan Conference on Crime Countermeasures, May 16, 1979, pp. 101-109.
Dautzenberg, “Watermarking Images,” Department of Microelectronics and Electrical Engineering, Trinity College Dublin, 47 pages, Oct. 1994.
Szepanski, “Additive Binary Data Transmission for Video Signals,” Conference of the Communications Engineering Society, 1980, NTG Technical Reports, vol. 74, pp. 343-351. (German text and English translation enclosed).
U.S. Provisional application Ser. No. 60/071,983, Levy, filed Jan. 20, 1998.
U.S. patent application Ser. No. 09/404,291, Levy, filed Sep. 23, 1999.
U.S. Provisional application Ser. No. 60/114,725, Levy, filed Dec. 31, 1998.
U.S. patent application Ser. No. 09/234,780, Rhoads/Gustafson, filed Jan. 20, 1999.
U.S. Provisional application Ser. No. 60/116,641, Cookson, filed Jan. 21, 1999.
U.S. patent application Ser. No. 09/478,713, Cookson, filed Jan. 6, 2000.
Cookson, Chris, General Principles of Music Uses on Portable Devices, presented to SDMI, Mar. 5, 1999.
Winograd, J.M., “Audio Watermarking Architecture for Secure Digital Music Distribution,” a Proposal to the SDMI Portable Devices Working Group, by Aris Technologies, Inc., Mar. 26, 1999.
Mintzer et al., “Safeguarding Digital Library Contents and Users: Digital Watermarking,” D-Lib Magazine, Dec. 1997, 12 pages.
U.S. patent application Ser. No. 09/765,102, Shaw, filed Jan. 17, 2001.
U.S. patent application Ser. No. 09/761,349, Rhoads, filed Jan. 16, 2001.
U.S. patent application Ser. No. 09/761,280, Rhoads, filed Jan. 16, 2001.
U.S. patent application Ser. No. 09/645,779, Tian et al., filed Aug. 24, 2000.
U.S. patent application Ser. No. 09/689,226, Brunk, filed Oct. 11, 2000.
U.S. patent application Ser. No. 09/689,250, Ahmed, filed Oct. 11, 2000.
U.S. patent application Ser. No. 09/689,293, Tian et al., filed Oct. 11, 2000.
U.S. patent application Ser. No. 09/625,577, Carr et al., filed Jul. 25, 2000.
U.S. patent application Ser. No. 09/574,726, Rhoads et al., filed May 18, 2000.
U.S. patent application Ser. No. 09/562,524, Carr et al., filed May 1, 2000.
U.S. patent application Ser. No. 09/498,223, Rhoads et al., filed Feb. 3, 2000.
U.S. patent application Ser. No. 09/465,418, Rhoads et al., filed Dec. 16, 1999.
U.S. patent application Ser. No. 09/431,990, Rhoads, filed Nov. 3, 1999.
U.S. patent application Ser. No. 09/428.359, Davis et al., filed Oct. 28, 2000.
U.S. patent application Ser. No. 09/342,972, Rhoads, filed Jun. 29, 1999.
U.S. patent application Ser. No. 09/293,602, Rhoads, filed Apr. 15, 1999.
U.S. patent application Ser. No. 09,293,601, Rhoads, filed Apr. 15, 1999.
U.S. patent application Ser. No. 09/287,940, Rhoads, filed Apr. 7, 1999.
U.S. patent application Ser. No. 09/185,380, Davis et al., filed Nov. 3, 1998.
U.S. patent application Ser. No. 09/074,034, Rhoads, filed May 6, 1998.
U.S. patent application Ser. No. 09/127,502, Rhoads, filed Jul. 31, 1998.
U.S. Provisional application Ser. No. 60/082,228, Rhoads, filed Apr. 16, 1998.
U.S. Provisional application Ser. No. 60/198,138, Alattar, filed Apr. 17, 2000.
Audio Watermarking Architectures for Secure Digital Music Distribution, A Proposal to the SDMI Portable Devices Working Group by ARIS Technologies, Inc, Mar. 26, 1999, pp. 1-11.
Audio Watermarking Architectures for Persistent Protection, Presentation to SDMI PDWG, Mar. 29, 1999. J. Winograd, Aris Technologies, pp. 1-16.
Audio Watermarking System to Screen Digital Audio Content for LCM Acceptance, A Proposal Submitted in Response to PDWG99050504-Transition CƒP by ARIS Technologies, Inc., May 23, 1999, Document Version 1.0, 15 pages.
Boland et al., “Watermarking Digital Images for Copyright Protection”, Fifth Int'l Conference on Image Processing and it's Application, Jul. 1995, pp. 326-330.
Levy, “AIPL's Proposal for SDMI: An Underlying Security System” (slide presentation), Mar. 29, 1999, 23 slides.
Microsoft Response to CƒP for Technology Solutions to Screen Digital Audio Content for LCM Acceptance, SDMI, PDWG Tokyo, May 23, 1999, 9 pages.
Response to CƒP for Technology Solutions to Screen Digital Audio Content for LCM Acceptance, NTT Waveless Radio Consotium, May 23, 1999, 9 pages.
Sandford II et al., “The Data Embedding Method”, Proceedings of the SPIE vol. 2615, pp. 226-259, 1996.
Thomas, Keith, Screening Technology for Content from Compact Discs, May 24, 1999, 11 pages.
Tirkel et al., “Electronic Water Mark,” Dicta-93, Marquarie University, Sydney, Australia, Dec., 1993, pp. 666-672.
Vidal et al., “Non-Noticeable Information Embedding in Color Images: Marking and Detection”, IEEE 1999, pp. 293-297.
Wolfgang et al., “A Watermark for Digital Images,” Computer Vision and Image Processing Laboratory, Purdue University, Sep. 1996, pp. 219-222.
U.S. patent application Ser. No. 2002/001095, Kawakami et al., filed Jan. 3, 2002.
“Access Control and COpyright Protection for Images, WorkPackage 8: Watermarking,” Jun. 30, 1995, 46 pages.
“Access Control and COpyright Protection for Images, WorkPackage 3: Evaluation of Existing Systems,” Apr. 19, 1995, 68 pages.
“Access Control and COpyright Protection for Images, WorkPackage 1: Access Control and Copyright Protection for Images Need Evaluation,” Jun., 1995, 21 pages.
“Access Control and COpyright Protection for Images, Conditional Access and Copyright Protection Based on the Use of Trusted Third Parties,” 1995, 43 pages.
Arachelian, “White Noise Storm,” Apr. 11, 1994, Internet reference, 13 pages.
Arazi, et al., “Intuition, Perception, and Secure Communication,” IEEE Transactionson Systems, Man, and Cybernetics, vol. 19, No. 5, Sep./Oct. 1989, pp. 1016-1020.
Arthur, “Digital Fingerprints Protect Artwork,” New Scientist, Nov. 12, 1994, p. 24.
Aura, “Invisible Communication,” Helskinki University of Technology, Digital Systems Laboratory, Nov. 5, 1995, 13 pages.
Bender et al, “Techniques for Data Hiding,” Draft Preprint, Private Correspondence, dated Oct. 30, 1995.
Bender et al., “Techniques for Data Hiding,” Massachusetts Institute of Technology, Media Laboratory, Jan. 1995, 10 pages.
Boneh, “Collusion-Secure Fingerprinting for Digital Data,” Department of Computer Science, Princeton University, 1995, 31 pages.
Boney et al., “Digital Watermarks for Audio Signals,” Proceedings of Multimedia '96, 1996 IEEE, pp. 473-480.
Boucqueau et al., Equitable Conditional Access and Copyright Protection for Image Based on Trusted Third Parties, Teleservices & Multimedia Communications, 2nd Int. Cost 237 Workshop, Second International Cost 237 Workshop, Nov., 1995; published 1996, pp. 229-243.
Brassil et al., “Hiding Information in Document Images,” Nov., 1995, 7 pages.
Brown, “S-Tools for Windows, Version 1.00, COPYRGT. 1994 Andy Brown, What is Steganography,” Internet reference, Mar. 6, 1994, 6 pages.
Bruyndonckx et al., Neural Network Post-Processing of Coded Images Using Perceptual Masking, 1994, 3 pages.
Bruyndonckx et al., “Spatial Method for Copyright Labeling of Digital Images,” 1994, 6 pages.
Burgett et al., “A Novel Method for Copyright Labeling Digitized Image Data,” requested by e-mail from author (unavailable/password protected on IGD WWW site); received Sep. 18, 1995, 12 pages.
Caronni, “Assuring Ownership Rights for Digital Images,” Published in the Proceedings of ‘Reliable IT Systems,’ VIS '95, HH. Bruggemann and W. Gerhardt-Hackl (Ed.), Vieweg Publishing Company, Germany, 1995, Jun. 14, 1994, 10 pages.
Caruso, “Digital Commerce, 2 plans for watermarks, which can bind proof of authorship to electronic works.” New York Times, Aug. 7, 1995, one page.
Castro et al., “Registration of Translated and Rotated Images Using Finite Fourier Transforms,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. PAMI-9, No. 5, Sep. 1987, pp. 700-703.
Choudhury, et al., “Copyright Protection for Electronic Publishing over Computer Networks,” IEEE Network Magazine, Jun. 1994, 18 pages.
Clarke, “Invisible Code Tags Electronic Images,” Electronic Engineering Times, Jun. 12, 1995, n. 852, p. 42.
“Copyright Protection for Digital Images, Digital Fingerprinting from FBI,” Highwater FBI brochure, 1995, 4 pages.
“The Copyright Can of Worms Opened Up By The New Electronic Media,” Computergram Internations, pCGN07170006, Jul. 17, 1995 and “The Copyright Can of Worms Opened Up By the New Electronic Media--2,” Computergram Internations, pCGN07210008, Jul. 21, 1995, 3 pages total.
Cox et al., “Secure Spread Spectrum Watermarking for Multimedia,” NEC Research Institute Technical Report, Dec. 5, 1995, 33 pages.
Cox et al., “A Secure, Imperceptable Yet Perceptually Salient, Spread Spectrum Watermark for Multimedia,” IEEE, Southcon/96, Conference Record, pp. 192-197, 1996.
“Cyphertech Systems: Introduces Digital Encoding Device to Prevent TV Piracy,” Hollywood Reporter, Oct. 20, 1993, p. 23.
Delaigle et al., “Digital Watermarking,” Proc. SPIE--Int. Soc. Opt. Eng., vol. 2659, pp. 99-110, 1996.
Delaigle et al., “A Psychovisual Approach for Digital Picture Watermarking,” 1995, 20 pages.
DICE Digital Watermark System, Q&A, Dec., 1995, 12 pages.
Digimarc presentation at RSA Conference, approximately Jan. 17, 1996, 4 pages.
Fimmerstad, “The Virtual Art Museum,” Ericsson Connexion, Dec., 1995, pp. 29-31.
Fitzgerald, “Invisible Digital Copyright ID,” Editor & Publisher, Jun. 25, 1994, p. 62.
“Foiling Card Forgers With Magnetic ‘Noise,’” Wall Street Journal, Feb. 8, 1994.
Frequently Asked Questions About Digimarc Signature Technology, Aug. 1, 1995, HTTP://WWW.DIGIMARC.COM, 9 pages.
Friedman, “The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image,” IEEE Transactions on Consumer Electronics, vol. 39, No. 4, Nov., 1993, pp. 905-910.
Gabor, et al., “Theory of Communication,” J. Inst. Elect. Eng. 93, 1946, pp. 429-441.
Hartung et al., Digital Watermarking of Raw and Compressed Video, Proc. SPIE 2952, Digital Compression Technologies and Systems for Video Communication, Oct., 1996, pp 205-213.
Hecht, “Embedded Data Glyph Technology for Hardcopy Digital Documents,” SPIE vol. 2171, Feb. 1994, pp. 341-352.
“Holographic signatures for digital images,” The Seybold Report on Desktop Publishing, Aug. 1995, one page.
Humphrey, “Stamping Out Crime,”Hollywood Reporter, Jan. 26, 1994, p. S48.
Jain, “Image Coding Via a Nearest Neighbors Image Model,” IEEE Transactions on Communications, vol. COM-23, No. 3, Mar. 1975, pp. 318-331.
Johnson, “Steganography,” Dec. 10, 1995, 32 pages.
JPEG Group's JPEG Software (release 4), ftp.csua.berekeley.edu/pub/cypherpunks/applications/jsteg/jpeg.announcement.gz.
Kassam, Signal Detection in Non-Gaussia Noise, Dowden & Culver, 1988, pp. 1-96.
Koch et al., “Digital Copyright Labeling: Providing Evidence of Misuse and Tracking Unauthorized Distribution of Copyrighted Materials,” Oasis Magazine, Dec. 1995, 3 pages.
Luc, “Analysis of Spread Spectrum System Parameters for Design of Hidden Transmission,”Radioengineering, vol. 4, No. 2, Jun. 1995, pp. 26-29.
Machado, “Announcing Stego 1.0a2, The First Steganography Tool for the Macintosh,” Internet reference, Nov. 28, 1993, 3 pages.
Macq, “Cryptology for Digital TV Broadcasting,” Proceedings of the IEEE, vol. 83, No. 6, Jun. 1995, pp. 944-957.
Matthews, “When Seeing is Not Believing,” New Scientist, Oct. 16, 1993, pp. 13-15.
Matsui et al., “Video-Steganography: How to Secretly Embed a Signature in a Picture,” IMA Intellectual Property Project Proceedings, Jan. 1994, vol. 1, Issue 1, pp. 187-205.
Mintzer et al., “Toward on-line, Worldwide Access to Vatican Library Materials,” IBM J. Res. Develop. vol. 40 No. 2, Mar., 1996, pp. 139-162.
Moller, et al., “Rechnergestutzte Steganographie: Wie sie Funktioniert und warum folglich jede Reglementierung von Verschlusselung unsinnig ist,” DuD, Datenschutz und Datensicherung, Jun. 18, 1994 318-326.
“NAB--Cyphertech Starts Anti-Piracy Broadcast Test,” Newsbytes, NEW03230023, Mar. 23, 1994.
Nakamura et al., “A Unified Coding Method of Image and Text Data Using Discrete Orthogonal Transform,” Systems and Computers in Japan, vol. 21, No. 3, 1990, pp. 87-92.
Nakamura et al., “A Unified Coding Method of Dithered Image and Text Data Using Micropatterns,” Electronics and Communications in Japan, Part 1, vol. 72, No. 4, 1989, pp. 50-56.
New Product Information, “FBI at AppleExpo” (Olympia, London), Nov., 1995, 2 pages.
Ohnishi et al., Embedding a Seal into a Picture Under Orthogonal Wavelet Transform, Proceedings of Multimedia '96, 1996, IEEE, pp. 514-421.
ORuanaidh et al, “Watermarking Digital Images for Copyright Protection,” http://www.kalman.mee.tcd.ie/people/jjr/eva.sub.--pap.html, Feb. 2, 1996, 8 pages. (Also published Aug., 1996, IEE Proceedings-Vision, Image and Signal Processing, vol. 143, No. 4, pp. 250-256).
Pennebaker et al., JPEG Still Image Data Compression Standard, Chapter 3, “Aspects of the Human Visual System,” pp. 23-27, 1993, Van Nostrand Reinhold, New York.
Pickholtz et al., “Theory of Spread-Spectrum Communications--A Tutorial,” Transactions on Communications, vol. COM-30, No. 5, May, 1982, pp. 855-884.
Pitas et al., “Applying Signatures on Digital Images,” IEEE Workshop on Nonlinear Image and Signal Processing, Neos Marmaras, Greece, pp. 460-463, Jun. 1995.
Port, “Halting Highway Robbery on the Internet,” Business Week, Oct. 17, 1994, p. 212.
Roberts, “Picture Coding Using Pseudorandom Noise,” IRE Trans. on Information Theory, vol. 8, No. 2, Feb., 1962, pp. 145-154.
Sapwater et al., “Electronic Copyright Protection, ” Photo>Electronic Imaging, vol. 37, No. 6, 1994, pp. 16-21.
Schneier, “Digital Signatures, Cryptographic Algorithms Can Create Nonforgeable Signatures for Electronic Documents, Making Them Valid Legal Instruments” BYTE, Nov. 1993, pp. 309-312.
shaggy@phantom.com, “Hide and Seek v.4.0,” Internet reference, Apr. 10, 1994, 3 pages.
Short, “Steps Toward Unmasking Secure Communications,” International Journal of Bifurcation and Chaos, vol. 4, No. 4, 1994, pp. 959-977.
Simmons, “Subliminal Channels; Past and Present,” ETT, vol. 5, No. 4, Jul.-Aug. 1994, pp. 45-59.
Sheng et al., “Experiments on Pattern Recognition Using Invariant Fourier-Mellin Descriptors,” Journal of Optical Society of America, vol. 3, No. 6, Jun., 1986, pp. 771-776.
Sklar, “A Structured Overview of Digital Communications--a Tutorial Review--Part I,” IEEE Communications Magazine, Aug., 1983, pp. 1-17.
Sklar, “A Structured Overview of Digital Communications--a Tutorial Review--Part II,” IEEE Communications Magazine, Oct., 1983, pp. 6-21.
“Steganography,” Intellectual Property and the National Information Infrastructure The Report of the Working Group on Intellectual Property Rights, Sep. 1995, pp. 212-213.
Tanaka et al., “Embedding Secret Information Into a Dithered Multi-Level Image,” Proc. IEEE Military Comm. Conf., Sep. 1990, pp. 216-220.
Tanaka, “Embedding the Attribute Information Into a Dithered Image,” Systems and Computers in Japan, vol. 21, No. 7, 1990, pp. 43-50.
Tirkel et al., “A Two-Dimensional Digital Watermark,” 1995, 6 pages.
Toga et al., “Registration Revisited,” Journal of Neuroscience Methods, 48 (1993), pp. 1-13.
van Schyndel et al., “Towards a Robust Digital Watermark,” ACCV '95, vol. 2, Dec., 1995, pp. 504-508.
Wagner, “Fingerprinting,” 1983 IEEE, pp. 18-22.
Walton, “Image Authentication for a Slippery New Age,” Dr. Dobb's Journal, Apr. 1995, pp. 18-26, 82-87.
“Watermarking & Digital Signature: Protect Your Work!” Published on Internet 1996, http://Itswww.epfl.ch/about.jordan/watermarking.html.
Wise, “The History of Copyright, Photographers' Rights Span Three Centuries,” Photo>Electronic Imaging, vol. 37, No. 6, 1994.
van Schyndel et al., “A Digital Watermark,” IEEE International Conference on Image Processing, Nov. 13-16, 1994, pp. 86-90.
Zhao et al., “Embedding Robust Labels Into Images for Copyright Protection,” Proc. of the International Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies (Vienna, Austria) Aug. 21-25, 1995, 10 pages.
Bender, “Applications for Data Hiding,” IBM Systems Journal, vol. 39, No. 3-4, pp. 547-68, 2000.
Gruhl et al., “Information Hiding to Foil the Casual Counterfeiter,” Proc. 2d Information Hiding Workshop, LNCS vol. 1525, pp. 1-15 (Apr. 15, 1998).
Provisional Applications (1)
Number Date Country
60/356881 Feb 2002 US
Continuation in Parts (6)
Number Date Country
Parent 09/945243 Aug 2001 US
Child 10/115441 US
Parent 09/933863 Aug 2001 US
Child 09/945243 US
Parent 09/898901 Jul 2001 US
Child 09/933863 US
Parent 09/553084 Apr 2000 US
Child 09/898901 US
Parent 10/115441 US
Child 09/898901 US
Parent 10/092593 Mar 2002 US
Child 10/115441 US