Digital watermark systems and methods

Abstract
A digital watermark is added to audio or visual content. An illustrative embodiment permutes the content, alters the permuted content to encode a watermark, and inverse-permutes the content to return same to substantially its original form. Related watermark decoding methods are also detailed, as are ancillary features and techniques.
Description
SPECIFICATION

The present technology relates to the provision of identification or authentication data, sometimes referred to as a watermark or signature, in digital media data such as digital image or audio data. In particular, this technology relates to a method and apparatus for incorporating a watermark in digital media data, and a method and apparatus for retrieving or extracting a watermark from digital media data in which a watermark has been previously incorporated.


In this specification the term “watermark” is used to refer to any distinctive or distinguishing data which may be used for identification or authentication of the digital media data associated therewith, or of some attribute of the media data such as the source thereof. A watermark may comprise image data, such as pixel data forming a logo or the like, or may be in the form of coded text and/or binary numbers, for example, which represent a message. In some applications the watermark data may include error correction coding techniques to improve the robustness of the watermark to image manipulation. The format of the signal that is to be watermarked is not restricted to a multi dimensional representation. It is also possible for audio information to be watermarked. This method of encoding data is not restricted to information associated with copyright and could be used to convey any suitable information in a hidden manner.


Watermarks are utilised in media data for a number of reasons, one being to prevent or discourage copying of the media data if it is subject to copyright, or to at least allow for identification of the media data even if it is copied. Visible watermarks have been employed for many years in varying applications including banknotes and photographs, but have significant disadvantages because of their visible nature. Although a visible watermark may be quite effective in discouraging copying of an associated image, in general it is considered disadvantageous for a watermark to be obtrusive upon the original image.


Besides the issue of whether or not the watermark is visible in an associated image (or audible in the case of watermarked audio media), several other factors may also be considered important.


For example, the watermark should usually be robust to manipulation of the watermarked media, and desirably should be secure so as to not be easily removable by a malicious user. Before the advent of digital media processing and manipulation, a degree of robustness and security was inherent in a visible watermark, because a copy of the watermarked image would generally bring with it the visible watermark itself which would be difficult to remove. However, digital processing makes it possible to perform many sophisticated manipulative operations on watermarked media, which may degrade the visible watermark or be utilised to alter an image to at least substantially remove the watermark. In this case, therefore, the properties of a visible watermark count against the security thereof since it is clearly visible what must be removed or altered in the watermarked image. A paper entitled “Protecting publicly-available images with a visible image watermark” (Braudaway, et al, SPIE Vol. 2659, pp 126-133) discusses robustness and security in visible image watermarks.


Visible watermarks are considered unsuitable for many modern applications because of the intrusive effect of the watermark on the original media. Watermarking schemes have been developed in which the watermark is substantially invisible on an original image but readily visible on a copy thereof. However, such schemes generally rely upon characteristics of photocopying or electronic scanning apparatus, and so are only suitable for a limited range of applications, such as in images or text on paper documents. In any event, these watermarking schemes are also subject to security difficulties arising from digital processing and manipulation.


In media involving a sequence of images, such as video media, it is particularly undesirable for a watermark to be intrusively visible, since considerable effort is expended in providing the image data to the user in a form which is as visually clear as possible, and a visible watermark may significantly detract from the original image. Visible watermarks are presently used in some video applications, particularly television coverage of live sporting events where a relatively small and faint logo or the like is superimposed on the television picture, typically near one corner thereof. This is not completely satisfactory, besides the visual intrusion, because the logo can be easily cropped from the picture in a copy thereof, or could be relatively easily removed, at least substantially, with digital processing techniques. To make the visible watermark more secure it should be placed over the visually most important part of the image, which also makes the watermark more intrusive and thus less desirable.


Invisible watermarking techniques, particularly for digital media data, have been developed, and one is described in an article entitled “Watermarking Digital Images for Copyright Protection” (J. J. K. O'Ruanaidh, F. M. Boland & O. Sinnen). This article discloses a method of embedding a watermark in a digital image which is said to be invisible and quite robust.


The image data is divided into rectangular blocks, and each block is then transformed using either a Walsh transform, discrete cosine transform (DCT) or wavelet transform. The bits defining the watermark graphic are inserted in the digital image by incrementing or decrementing a selected coefficient in the transform domain of the data block. Coefficients are selected according to a criterion based on energy content. Another algorithm described in the article relates to insertion of watermark data based on the use of the discrete Fourier transform (DFT). This method differs fundamentally from the transform domain technique outlined above. The DFT is a complex transform that generates complex transform domain coefficients given a real valued input. The watermark is placed in the phase component of generated transform coefficients when using this transform.


Another article which addresses the difficult issues of digital watermarking is “Secure Spread Spectrum Watermarking for Multimedia” (Cox, et al, NEC Research Institute, Technical Report 95-10). This article describes an invisible digital watermarking method for use in audio, image, video and multimedia data.


The method described in this article also involves a frequency domain transform of the image data and insertion of the watermark data whilst in the transform domain. In practice, in order to place a length n watermark into an N×N image, the discrete cosine transform of the image is computed, and the watermark data encoded into the n highest magnitude coefficients of the transform matrix, excluding the dc component.


The watermarking techniques of O'Ruanaidh et al and Cox et al require the original image when performing the watermark extraction operation. As a consequence, proof of ownership is accomplished only if the original image is certified as being the original by a trusted third party, and the particular segment of the original image must be first identified and found before ownership is verified.


The technology detailed herein addresses some of the difficulties identified in the prior art.


As detailed more fully below, an exemplary method for inserting data into digital media data may include:

    • segmenting the digital media data into data blocks;
    • applying a pseudo-random reversible function to a block of the digital media data to obtain a modified data block;
    • applying an orthogonal transform on the modified data block to obtain transform domain data;
    • modifying at least one selected transform domain data coefficient in accordance with identification or authentication data;
    • inverse transforming the transform domain data having the at least one modified coefficient; and
    • applying an inverse pseudo-random function to obtain watermarked digital media data.


The pseudo-random reversible function can have the property of flattening the power spectral density of the data block (i.e., the function performs a spectral whitening operation), such that each coefficient then generated by the transform contributes substantially equally to the total energy of the block. This allows the watermarking process to be less sensitive, with regard to introduced distortion, to the selection of the transform coefficient which is modified in the watermark insertion operation.


As detailed more fully below, an exemplary method for extracting data from watermarked digital media may include:

    • segmenting the digital media data into data blocks;
    • applying a pseudo-random reversible function to a block of the digital media data to obtain a modified data block;
    • applying an orthogonal transform to the modified data block to obtain transform domain data; and
    • extracting identification or authentication data from at least one coefficient of the transform domain data.


The insertion and/or extraction method can be performed in real time, which is particularly advantageous when the digital media data has presentation timing restrictions, such as in the case of real time video and/or audio data.


The average (dc) component of the transformed media data can be restricted to a single known transform coefficient and that this transform coefficient is not available for modification by the watermark insertion operation. The pseudo-random reversible function can be tolerant to the introduction of noise resulting from signal processing that could subsequently be performed on the watermarked media data. Many different pseudo-random functions could be used for this application. One pseudo-random function that offers good performance in terms of its noise rejection capability, spectral flattening performance and simplicity of implementation is a permutation of the data block based upon a keyed random number generator. In that case, the user desirably should ensure that a permutation is selected that exhibits the desired spectral whitening characteristics, as this is not guaranteed by all permutations.


A number of different transforms exist that could be used as the orthogonal transform operation. These include the Walsh Hadamard Transform (WHT), Discrete Cosine Transform (DCT), Discrete Sine Transform (DST) and Fast Fourier Transform (FFT). As noted, the Walsh Hadamard Transform often provides low implementation complexity. The AC transform coefficients generated with such a transform in conjunction with an appropriate pseudo-random function, using real image data as input, are characterised by all possessing approximately equal energy. The selection of transform coefficient(s) for modification can thus be based on a random keyed operation to further enhance the security of the watermark.


For functions and transforms that do not restrict the average value of the data block to a single transform coefficient, the average (dc) value for the data block can be calculated, stored, and subtracted from each data value in the data block prior to the application of the of the pseudo-random function (this reduces watermark visibility). The average value is subsequently retrieved and added to each data value making up the watermarked data block immediately after the application of the inverse pseudo-random function.


The application of the pseudo-random function and the application of the orthogonal transform can be combined into a single operation. Similarly with respect to the inverse pseudo-random function and inverse transform. A combined data permutation and transform operation can be considered equivalent to, in the one dimensional case, performing a permutation upon the columns making up the basis matrix of the transform in question. Each permutation will yield an orthogonal transform, hence the number of transforms contained in the set is equal to the number of available permutations. Using this interpretation, the security of the watermark relies not just on which transform coefficient has been modified to contain the watermark data, but also on which member of the set of available transforms has been used.


Yet another embodiment provides apparatus for inserting or extracting watermark data in digital media data, comprising:


segmenting means for segmenting the digital media data into data blocks; processing means for applying a pseudo-random reversible function to a block of the digital media data to obtain a modified data block and performing a transform on the modified data block to obtain transform domain data; and means for inserting or extracting watermark data in at least one coefficient of the transform domain data.


In the case where watermark data is to be inserted in the digital media data, the processing means can be adapted to perform an inverse transformation and inverse pseudorandom function on the transform domain data containing the watermark data so as to obtain watermarked digital media data.


In practice, the segmenting of the digital media data into data blocks might comprise forming blocks of 64×64 pixels of image luminance pixel data, where the watermark is to be inserted into a still image or image sequence. The block size need not be restricted to being square and of dimension 64×64 pixels; both smaller and larger block sizes are possible depending upon application requirements. In practice, the identification/authentication data which is inserted into a data block of digital media data might comprise a pixel from a binary graphic, or data in the form of bits used to represent text and binary numbers, for example. The watermark data is inserted into the data block that has undergone a block transform operation. The distortion introduced due to the insertion of watermark data is dependent upon the block size, the number of transform coefficients modified by the insertion operation, and the magnitude of the modification. The watermark data density per block is arbitrary depending upon application requirements. In general, however, the higher the density the more visually noticeable is the inserted watermark in the image. A series of data blocks may be contained in a single image frame or spread over a number of image frames.


A great variety of other arrangements and improvements are also detailed.


Certain embodiments detailed below have one or more of the following advantages:

    • 1. the presence of the watermark is invisible (i.e., the watermarked visual or audio material is visually or auditorially substantially indistinguishable from the original);
    • 2. the watermark is robust to signal manipulation and distortion;
    • 3. the watermark is secure;
    • 4. the original media data is not required in order to extract the watermark;
    • 5. the watermark can be inserted and/or extracted by a simple computational procedure which can be done in real time.


The foregoing and additional features and advantages of our technology will be more readily apparent—by way of example only—from the following detailed description, which proceeds with reference to the accompanying drawings.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a flowchart illustrating exemplary operations for inserting watermark data into digital media data;



FIG. 2 is a flowchart illustrating exemplary operations for extracting watermark data from digital media data;



FIG. 3 is a diagram of an exemplary watermark insertion process;



FIG. 4 is a flowchart illustrating exemplary operations for a particular implementation of a watermark insertion procedure;



FIG. 5 is a block diagram of an exemplary watermarking apparatus for real-time video; and



FIG. 6 is a block diagram of an exemplary media monitoring system.





DETAILED DESCRIPTION

The technology detailed herein relates to the insertion and extraction of identification or authentication data for use as a watermark in digital media data, such as digital image data, still or sequential, digital audio data or the like. A watermark provided in digital media data may provide a means for identification of the source or some other attribute of the media data as may be required to prove copyright ownership, for example. As mentioned above, embodiments detailed herein may have a number of advantageous properties, including:


the watermark presence being at least substantially invisible (i.e. the watermarked visual or audio material is visually or auditorially substantially indistinguishable from the original);


the watermark can be inserted and/or extracted by a simple computational procedure which can be done in real time for audio and/or video media data; and


the original media data not being required in order to extract the watermark from the watermarked media data.


Additionally, as also discussed above, it is desirable for watermarks in digital media data to also be both secure in that a malicious user cannot easily remove or disguise the watermark so as to prevent extraction, and robust to enable the inserted watermark to survive manipulation of the watermarked media data. Digital images and image sequences, for example, are seldom stored or transported over a communications link in their raw format.


Frequently some form of compression may be applied to the media data, and it can therefore be important that the signal processing associated with the compression algorithm does not remove or wash out the associated watermark inserted in the media data.


Although the following description refers primarily to still or sequential image data, it is to be understood that the technology is equally applicable to other forms of digital media data, such as digitised audio data.


In an exemplary embodiment, image pixel data is subdivided into 64×64 pixel spatial domain blocks in order to provide a manageable data segment in which to insert watermark data. For example, a digital image comprising 1,024×768 pixels may be nominally divided into blocks of 64×64 pixels so that the entire image is contained in an array of 16×12 image data blocks (a total of 192 data blocks). Different watermark data may then be inserted into each data block, so that the watermark data is spread over the entire image. For example, the watermark might comprise a 16×12 pixel logo or the like, so that a value representing each pixel of the logo is inserted in a respective data block of the digital image.


Alternatively, the watermark may comprise a text message formed in ASCII code and/or binary numbers. A message comprising of 192 bits could be inserted in the digital image if a watermark density of 1/4096 (one bit per 64×64 block) was employed.


The invisibility and robustness of the watermark are aided by dividing the image into blocks and distributing the watermark data throughout the data blocks, and are further facilitated by the insertion procedure utilised to insert the watermark data into each data block. The following acts are used in an illustrative embodiment to insert a watermark data bit or binary pixel graphic into a 64×64 spatial domain luminance data block


(i) Permute the 64×64 data block using a predetermined random permutation. There exist 4096 factorial different ways in which this permutation can be performed. To minimise the distortion introduced by the watermark modification, a permutation can be selected that performs a spectral whitening operation on a signal that has a predominant low pass power spectral density. The permutation is generated from a keyed pseudo-random operation.


(ii) Transform the permuted data using a Walsh Hadamard Transform. This transform can be implemented as a 4096-point one dimensional fast transform operation.


(iii) Watermark data is inserted into the data block by modification of selected transform coefficient(s). The coefficient selection process is based on a keyed-pseudo random operation, and does not include the dc coefficient in set of coefficients available for modification. To maximise security of the watermarking process, different coefficients are selected via the pseudo-random operation for each data block.


A watermark data bit can be represented by the sign of a selected transform coefficient. A transform coefficient value greater than or equal to zero could represent logic zero and the negative values logic one. Transform coefficient(s) need only be modified if necessary, to ensure that the sign (+/−) corresponds the digital bit to be embedded (1/0).


(iv) An inverse transform is then applied to reconstruct an approximation of the original 64×64 spatial domain data block. In the transform domain, the watermark data is completely contained by one transform coefficient when using a watermark data density 1/4096. In the spatial domain, however, the watermark data is distributed over each of the pixels making up the 64×64 data block.


The watermark read operation is accomplished by repeating acts (i) and (ii) above. The original image or image sequence is not required for the reading operation. The watermark data can be extracted with the knowledge of the permutation applied to the data block, the transform operation, and which of the transform coefficient(s) modified to contain the watermark data. The permutation employed can be kept secret by the owner of the image or image sequence. The permutation could be represented by a secret seed number to a well defined pseudo random number generator.


Block transforms such as the classic Walsh Hadarnard Transform (WHT), Discrete Cosine Transform (DCT), Discrete Sine Transform (DST) and the Haar Transform (HT) can be employed in the watermarking process in embodiments of this technology. For transforms that isolate the average block value or dc value into one coefficient, that coefficient typically should not be used to contain watermark data. The WHT enjoys low implementation complexity. Fast transform implementations of the WHT exist that require only summing and one scaling operation, and the transform basis vector contains only +1 and −1 elements. The analysis and synthesis transforms are identical.



FIG. 1 illustrates a flow chart of operation involved in insertion of watermark data into digital media data, in one exemplary embodiment. Beginning at block 12, the digital media data is first segmented into manageable data blocks such as blocks of 64×64 pixels or equivalent data elements. Block 13 calculates the average pixel value for the block which is then subtracted from each pixel. Block 13 is unnecessary when using a transform that contains the block average in a single transform coefficient. This is the case with the WHT and the DCT, for example. The resulting dc transform coefficient typically is not used to contain watermark data. The media data block or segment is then subjected to a permute operation (block 14) in which the data elements of the block or segment are rearranged in a pseudo random, but repeatable and reversible manner. Next, at block 16, the permuted spatial domain media data segment is subjected to the transform operation. In this embodiment one of the transform coefficients is selected and modified to include watermark data. When watermarking images or image sequences a watermark data bit could be represented by the sign of the selected transform coefficient. A transform coefficient value greater than or equal to zero could represent logic zero and the negative values logic one.


The watermark data density per block in this case is 1/4096. In some applications, densities greater than 1/4096 may be required.


Following insertion of the watermark data into the transform domain of the media data, the spatial domain media data is then reconstructed through blocks 20, 22 and 23 by performing an inverse transformation followed by an inverse permute operation and then the previously subtracted block average value added to each pixel making up the block. Again, block 23 is not necessary when using a transform that contains the block average in a single transform coefficient. The resulting digital media data segment contains watermark data which is robust to manipulation thereof, secure from unauthorised removal, and yet the reconstructed, watermarked media data is substantially indistinguishable from the original spatial domain media data when compared in subjective quality testing.


In order to extract the watermark data form digital media data in which watermark data has been previously inserted, the procedure outlined in the flow chart of FIG. 2 may be employed. Essentially this involves acts mirroring the first half of the procedure illustrated in FIG. 1. The digital media data is first segmented as discussed previously (block 32), the average pixel value for that block is determined and subtracted from each pixel (block 33) if necessary. The resulting data block is then subjected to a permute operation as shown at block 34. The permute operation must be the same as that performed during insertion of the watermark data, and thus if different permute operations are variously employed, some record must be maintained of which of the particular 4096 factorial permutations applies to the particular media data segment in question. This could be in the form of a secret seed to a well defined pseudo random number generator. The permuted media data segment is then transformed with the same transform used by the insertion operation (block 36). Then it is a simple matter to extract the particular coefficient for the transform domain media data and then recover from this the watermark information.



FIG. 3 illustrates a block diagram of the watermark insertion process described in connection with the flow chart of FIG. 1. As discussed above, in this embodiment only a single watermark data component, e.g. a data bit or binary graphic pixel, is inserted into each selected digital media data segment or block, and the information required to reconstruct an entire watermark requires the examination of a number of digital media data segments.



FIG. 4 is a flow chart illustrating the insertion process of watermark data into digital media data, which has been segmented into data blocks, over a series of data blocks. Where the digital media data comprises a sequence of images, such as in the case of digital video or the like, a complete watermark (e.g. the total of the identification data) may in fact be distributed over more than one image or image frame. At block 42 the first data block in the image or sequence of images is selected and, if necessary, the average of that block is then calculated and subtracted from each pixel element in block 43. The resulting data block forming the image segment is subjected to a permute operation, as described hereinabove, at block 44. The permuted image data is then transformed using a block transform. At block 47 a particular transform coefficient is selected for possible modification. The selection process is performed in a pseudo random deterministic manner. Transforms that contain the block average (dc) in one transform coefficient, or set of coefficients, must typically eliminate this coefficient from the selection process. Block 48 performs the modification operation to incorporate the watermark data into the selected transform coefficient(s). The inverse of the transformation and permute operations are then applied at blocks 50 and 52 and block 53 adds to each pixel value the average as determined in block 43, if necessary. A test is then applied at block 54 to determine whether the media data has finished, and if so the watermarking procedure ends. Otherwise, the next block of the digital media data is selected at block 56. The watermark data is then incremented, meaning the next component of the watermark data, such as the next data bit or binary pixel element, is selected at block 58. Of course, it will be recognised that it is unnecessary for every data block of a particular digital media data source to be encoded with watermark data, and only a certain selection of data blocks may in fact be encoded with watermark data in practice. To provide copyright protection for the complete image sequence, the watermark can be repeatedly inserted, with the watermark beginning at different frame locations within the sequence and ensuring that watermarks do not overlap. Of course, acquisition of the signal is important. This can be accomplished, by incorporating in the watermark data, synchronisation information that, once acquired informs the watermark reader the location of the beginning of the watermark message data or binary graphic.


To increase robustness and ensure readability even in the case where the original video signal is significantly changed, such as through reduced spatial resolution or the case where watermarked interlaced material is later converted to non-interlaced format, the watermark can be distributed across both fields in such a way that the watermark can be independently read from either or both fields and/or restricted to the low spatial frequencies. The latter may be accomplished by the application of a 2×2 WHT on each row of the image to produce low and high spatial frequency components. The watermark is then inserted in only the half horizontal resolution frame corresponding to the low spatial frequencies. The full resolution watermarked frame is produced by performing an inverse 2×2 WHT on the rows making up the low spatial frequency watermarked, half horizontal resolution frame and the original high spatial frequency half horizontal resolution frame.


In order to further improve security of the watermarking procedure, it is possible to alter the permute operation periodically (block 60 in FIG. 4). As mentioned above, it is nevertheless necessary that the particular permute operation performed on each data block be repeatable at a future time to enable extraction of the watermark.



FIG. 5 illustrates a block diagram of an exemplary watermarking apparatus for encoding real time video with watermark data. Real time video feed is provided to the apparatus at a buffer 80 or the like, which provides an input to real time processing circuitry 82. The circuitry 82 may comprise digital processing circuitry in the form of high speed programmable computer circuitry, for example, which carries out the algorithmic acts described in connection with FIG. 4, for example. The watermark data is provided from a buffer 84 which may be in the form, for example, of a ring buffer which cyclically feeds watermark data being a component of watermark text or graphic material to the processing circuitry 82. The reconstructed video data containing the watermark data is then passed to an output buffer 86 which provides the video data for transmission, recording or whatever function the video data is required for.


Implementations of this technology, operating in real time, can be utilised to add watermark data to media such as video and/or audio during live broadcast or other transmission, whilst recording to storage such as tape or disc, during broadcast or other transmission from storage, and during transferal from one storage device to another, for example. Furthermore, embodiments operating in real time can be used to monitor media such as television transmissions to detect the presence of watermark data incorporated in the media data. A block diagram of such a system is illustrated in FIG. 6. Video data is provided to a buffer 90 from a source such as a broadcast receiver or the like. Real time processing circuitry 93 is coupled to receive the media data from the buffer 90 and perform the algorithmic acts described in connection with FIG. 2, for example. This results in the extraction of any watermarking data contained in the media data which was inserted according to a process known to the monitoring apparatus (i.e. watermark data which has been added with a known permutation and transform in transform coefficients selected according to a known scheme). A comparison processor 94 can then be used to compare any watermark data which is retrieved with stored watermark data to determine if the retrieved watermark data corresponds to a known watermark indicating the source of the media data.


It will be appreciated from the foregoing description that the original media data is not required by the watermark extraction process in order to extract the watermark data, and therefore it is not required that the original image be certified by a trusted third party or held in escrow in order to prove the presence of a watermark in the media data. Random accessibility of a watermark within an image sequence is easily achieved, as all that is required to extract the watermark is the image or sequence of images that contains sufficient watermark data to reconstruct the entire watermark or a substantial portion thereof, and the secret keys used to seed the random permutation and the random coefficient selection process.


Watermarking processes as described herein have been tested on still images and image sequences, and have been demonstrated to be near invisible to the naked eye in a comparison between the reconstructed, watermarked media data and the original media data. It has also be found to be secure and robust to compression such as 4 Mbps MPEG coding of image sequences and 20% quality setting for JPEG compressed still images.


The described watermarking procedure is also robust to digital-to-analog and analog-to-digital conversions. Accordingly, implementations of such technology can be utilised to insert and extract watermark data in analog media as well as digital media. For example, watermark data can be inserted and extracted from broadcast or home quality analog or digital video.


Tests have been performed demonstrating a successful read operation for watermarked digital video originally of broadcast studio quality which has been temporarily recorded on an analog consumer VHS tape. In the case where the media is generated, stored and/or transmitted in an analog form, an analog-to-digital conversion using known techniques is used to obtain digital media data before inserting or extracting the watermark data (see 92 in FIG. 6). The media data may be returned to analog form, if desired, using known digital-to-analog techniques.


It will also be appreciated that the simple nature of the computational processes involved allow it to be applied quite readily to real time video data, for example. This is because the only two computationally complex acts in the watermarking procedure, namely the permutation and transformation are still relatively simple. This makes for a watermarking process that is very low in complexity, is easily automated, and requires no human intervention in its application.


The foregoing detailed description has been presented by way of example only, and is not intended to be considered limiting to the arrangements as defined in the claims.

Claims
  • 1. A method of watermark processing, the method comprising: receiving content data representing audio, image, or video information;receiving watermark data to be hidden in the content data;permuting at least some of the content data;transforming the permuted content data into a different domain;altering the transformed content data to represent the watermark data therein; andinverse-permuting the content data following the altering;wherein at least one of the foregoing acts is performed by a processor.
  • 2. The method of claim 1, further comprising inverse-transforming the content data back to an original domain after the altering.
  • 3. The method of claim 1, wherein the permuting performs a spectral whitening operation.
  • 4. The method of claim 1, wherein the permuting comprises applying a pseudo-random function.
  • 5. The method of claim 1, wherein the transforming comprises using a Walsh Hadamard transform.
  • 6. A method of watermark processing, the method comprising: receiving content data representing audio, image or video information;permuting at least some of the content data;transforming the permuted content data into another domain;decoding watermark data from the transformed content data, wherein the watermark data is encoded in the content data by previous alterations to the content data; andinverse-permuting the content data following the decoding;wherein at least one of the foregoing acts is performed by a processor.
  • 7. A non-transitory computer-readable medium having instructions stored thereon, the instructions comprising: instructions to receive content data representing audio, image, or video information;instructions to receive watermark data to be hidden in the content data;instructions to permute at least some of the content data;instructions to transform the permuted content data into another domain;instructions to alter the transformed content data to represent the watermark data therein; andinstructions to inverse-permute the content data following the altering.
  • 8. The non-transitory computer-readable medium method of claim 7, further comprising instructions to inverse-transform the content data back to an original domain after the altering.
  • 9. The non-transitory computer-readable medium method of claim 7, wherein the instructions to permute at least some of the content data performs a spectral whitening operation.
  • 10. The non-transitory computer-readable medium method of claim 7, wherein the instructions to permute comprises instructions to apply a pseudo-random function.
  • 11. The non-transitory computer-readable medium method of claim 7, wherein the instructions to transform comprises instructions to perform a Walsh Hadamard transform.
  • 12. An apparatus comprising: an input configured to: receive content data representing audio, image, or video information; andreceive watermark data to be hidden in the content data; andan electronic processor configured to: permute at least some of the content data;transform the permuted content data into another domain;alter the transformed content data to represent the watermark data therein; andinverse-permute the content data following the altering.
  • 13. The apparatus of claim 12, wherein the electronic processor is further configured to inverse-transform the content data back to an original domain after the altering.
  • 14. The apparatus of claim 12, wherein the electronic processor is further configured to permute at least some of the content data by performing a spectral whitening operation.
  • 15. The apparatus of claim 12, wherein the electronic processor is further configured to permute at least some of the content data by applying a pseudo-random function.
  • 16. The apparatus of claim 12, wherein the electronic processor is further configured to transform at least some of the content data by performing a Walsh Hadamard transform.
  • 17. A non-transitory computer-readable medium having instructions stored thereon, the instructions comprising: instructions to receive content data representing audio, image or video information;instructions to permute at least some of the content data; andinstructions to transform the permuted content data into another domain;instructions to decode watermark data from the transformed content data, wherein the watermark data is encoded in the content data by previous alterations to the content data; andinstructions to inverse-permute the content data following the decoding.
  • 18. An apparatus comprising: an input configured to receive content data representing audio, image or video information; andan electronic processor configured to: permute at least some of the content data;transform the permuted content data into another domain;decode watermark data from the transformed content data, wherein the watermark data is encoded in the content data by previous alterations to the content data; andinverse-permute the content data following the decoding.
Priority Claims (1)
Number Date Country Kind
PO5218/97 Feb 1997 AU national
RELATED APPLICATION DATA

This application is a continuation of application Ser. No. 11/695,523, filed Apr. 2, 2007, which is a division of copending application Ser. No. 09/367,797, filed Jan. 19, 2000 (now U.S. Pat. No. 7,269,734), which is a US nationalization of PCT application PCT/AU98/00106, filed Feb. 20, 1998, which claims priority to Australian application PO5218/97, filed Feb. 20, 1997. Priority to these applications is claimed under 35 USC §§119 and 120. These prior applications are incorporated herein by reference.

US Referenced Citations (227)
Number Name Date Kind
3695741 Dollenmayer Oct 1972 A
3984624 Waggener Oct 1976 A
4313197 Maxemchuk Jan 1982 A
4389671 Posner et al. Jun 1983 A
4650979 Stockburger et al. Mar 1987 A
4675746 Tetrick et al. Jun 1987 A
4703476 Howard Oct 1987 A
4750173 Bluthgen Jun 1988 A
4939515 Adelson Jul 1990 A
5031038 Guillemot et al. Jul 1991 A
5079648 Maufe Jan 1992 A
5113437 Best et al. May 1992 A
5146457 Veldhuis et al. Sep 1992 A
5293434 Feig et al. Mar 1994 A
5319735 Preuss et al. Jun 1994 A
5321748 Zeidler et al. Jun 1994 A
5327237 Gerdes et al. Jul 1994 A
5355161 Bird et al. Oct 1994 A
5363212 Taniuchi et al. Nov 1994 A
5555305 Robinson et al. Sep 1996 A
5581800 Fardeau et al. Dec 1996 A
5646997 Barton Jul 1997 A
5652626 Kawakami et al. Jul 1997 A
5659726 Sandford, II et al. Aug 1997 A
5663766 Sizer, II Sep 1997 A
5664018 Leighton Sep 1997 A
5673316 Auerbach et al. Sep 1997 A
5687191 Lee et al. Nov 1997 A
5721788 Powell et al. Feb 1998 A
5727092 Sandford, II et al. Mar 1998 A
5774452 Wolosewicz Jun 1998 A
5809139 Girod et al. Sep 1998 A
5822436 Rhoads Oct 1998 A
5825892 Braudaway et al. Oct 1998 A
5826227 Jayant Oct 1998 A
5848155 Cox Dec 1998 A
5850452 Sourgen et al. Dec 1998 A
5857038 Owada et al. Jan 1999 A
5859920 Daly et al. Jan 1999 A
5862260 Rhoads Jan 1999 A
5889868 Moskowitz et al. Mar 1999 A
5901178 Lee et al. May 1999 A
5903648 Javidi May 1999 A
5905800 Moskowitz et al. May 1999 A
5915027 Cox et al. Jun 1999 A
5919730 Gasper et al. Jul 1999 A
5930369 Cox et al. Jul 1999 A
5943422 Van Wie et al. Aug 1999 A
5949885 Leighton Sep 1999 A
6031914 Tewfik et al. Feb 2000 A
6061793 Tewfik May 2000 A
6069914 Cox May 2000 A
6104826 Nakagawa et al. Aug 2000 A
6122403 Rhoads Sep 2000 A
6181802 Todd Jan 2001 B1
6185312 Nakamura et al. Feb 2001 B1
6201879 Bender et al. Mar 2001 B1
6208735 Cox et al. Mar 2001 B1
6219634 Levine Apr 2001 B1
6226387 Tewfik et al. May 2001 B1
6229924 Rhoads et al. May 2001 B1
6272222 Hilton Aug 2001 B1
6272634 Tewfik et al. Aug 2001 B1
6307949 Rhoads Oct 2001 B1
6311214 Rhoads Oct 2001 B1
6381341 Rhoads Apr 2002 B1
6385329 Sharma et al. May 2002 B1
6408082 Rhoads et al. Jun 2002 B1
6421070 Ramos et al. Jul 2002 B1
6421450 Nakano Jul 2002 B2
6424725 Rhoads et al. Jul 2002 B1
6430301 Petrovic Aug 2002 B1
6504941 Wong Jan 2003 B2
6516079 Rhoads et al. Feb 2003 B1
6522770 Seder et al. Feb 2003 B1
6535617 Hannigan et al. Mar 2003 B1
6542927 Rhoads Apr 2003 B2
6553129 Rhoads Apr 2003 B1
6567533 Rhoads May 2003 B1
6580808 Rhoads Jun 2003 B2
6587944 Yeung et al. Jul 2003 B2
6590996 Rhoads et al. Jul 2003 B1
6611607 Davis et al. Aug 2003 B1
6614914 Rhoads et al. Sep 2003 B1
6647128 Rhoads Nov 2003 B1
6647130 Rhoads Nov 2003 B2
6650761 Rodriguez et al. Nov 2003 B1
6671376 Koto et al. Dec 2003 B1
6681028 Rhoads et al. Jan 2004 B2
6681029 Rhoads Jan 2004 B1
6694042 Seder et al. Feb 2004 B2
6694043 Seder et al. Feb 2004 B2
6700990 Rhoads Mar 2004 B1
6700995 Reed Mar 2004 B2
6704869 Rhoads et al. Mar 2004 B2
6718046 Reed et al. Apr 2004 B2
6718047 Rhoads Apr 2004 B2
6721440 Reed et al. Apr 2004 B2
6725372 Lewis et al. Apr 2004 B1
6760463 Rhoads Jul 2004 B2
6763123 Reed et al. Jul 2004 B2
6768809 Rhoads et al. Jul 2004 B2
6775392 Rhoads Aug 2004 B1
6792129 Zeng et al. Sep 2004 B1
6798894 Rhoads Sep 2004 B2
6813366 Rhoads Nov 2004 B1
6879701 Rhoads Apr 2005 B1
6917724 Seder et al. Jul 2005 B2
6920232 Rhoads Jul 2005 B2
6947571 Rhoads et al. Sep 2005 B1
6975746 Davis et al. Dec 2005 B2
6988202 Rhoads et al. Jan 2006 B1
6996252 Reed et al. Feb 2006 B2
7003731 Rhoads et al. Feb 2006 B1
7024016 Rhoads et al. Apr 2006 B2
7027614 Reed Apr 2006 B2
7035427 Rhoads Apr 2006 B2
7044395 Rhoads et al. May 2006 B1
7051086 Rhoads et al. May 2006 B2
7054465 Rhoads May 2006 B2
7062069 Rhoads Jun 2006 B2
7095871 Jones et al. Aug 2006 B2
7111170 Rhoads et al. Sep 2006 B2
7113614 Rhoads Sep 2006 B2
7139408 Rhoads et al. Nov 2006 B2
7158654 Rhoads Jan 2007 B2
7164780 Brundage et al. Jan 2007 B2
7171016 Rhoads Jan 2007 B1
7174031 Rhoads et al. Feb 2007 B2
7177443 Rhoads Feb 2007 B2
7213757 Jones et al. May 2007 B2
7224819 Levy et al. May 2007 B2
7248717 Rhoads Jul 2007 B2
7261612 Hannigan et al. Aug 2007 B1
7269734 Johnson Sep 2007 B1
7305104 Carr et al. Dec 2007 B2
7308110 Rhoads Dec 2007 B2
7313251 Rhoads Dec 2007 B2
7319775 Sharma et al. Jan 2008 B2
7330564 Brundage et al. Feb 2008 B2
7369678 Rhoads May 2008 B2
7377421 Rhoads May 2008 B2
7391880 Reed et al. Jun 2008 B2
7406214 Rhoads et al. Jul 2008 B2
7424131 Alattar et al. Sep 2008 B2
7427030 Jones et al. Sep 2008 B2
7433491 Rhoads Oct 2008 B2
7444000 Rhoads Oct 2008 B2
7444392 Rhoads et al. Oct 2008 B2
7450734 Rodriguez et al. Nov 2008 B2
7460726 Levy et al. Dec 2008 B2
7466840 Rhoads Dec 2008 B2
7486799 Rhoads Feb 2009 B2
7502759 Hannigan et al. Mar 2009 B2
7508955 Carr et al. Mar 2009 B2
7515733 Rhoads Apr 2009 B2
7536034 Rhoads et al. May 2009 B2
7537170 Reed et al. May 2009 B2
7545952 Brundage et al. Jun 2009 B2
7564992 Rhoads Jul 2009 B2
RE40919 Rhoads Sep 2009 E
7602978 Levy et al. Oct 2009 B2
7628320 Rhoads Dec 2009 B2
7643649 Davis et al. Jan 2010 B2
7650009 Rhoads Jan 2010 B2
7653210 Rhoads Jan 2010 B2
7657058 Sharma Feb 2010 B2
7685426 Ramos et al. Mar 2010 B2
7693300 Reed et al. Apr 2010 B2
7697719 Rhoads Apr 2010 B2
7711143 Rhoads May 2010 B2
7738673 Reed Jun 2010 B2
7747038 Rhoads Jun 2010 B2
7751588 Rhoads Jul 2010 B2
7751596 Rhoads Jul 2010 B2
7756290 Rhoads Jul 2010 B2
7760905 Rhoads et al. Jul 2010 B2
7762468 Reed et al. Jul 2010 B2
7787653 Rhoads Aug 2010 B2
7792325 Rhoads et al. Sep 2010 B2
7822225 Alattar Oct 2010 B2
7837094 Rhoads Nov 2010 B2
20010016049 Nguyen Aug 2001 A1
20010019611 Hilton Sep 2001 A1
20010020270 Yeung et al. Sep 2001 A1
20010034705 Rhoads et al. Oct 2001 A1
20010055407 Rhoads Dec 2001 A1
20020009208 Alattar et al. Jan 2002 A1
20020054356 Kurita et al. May 2002 A1
20020131076 Davis Sep 2002 A1
20020176003 Seder et al. Nov 2002 A1
20020186886 Rhoads Dec 2002 A1
20020196272 Ramos et al. Dec 2002 A1
20030040957 Rhoads et al. Feb 2003 A1
20030105730 Davis et al. Jun 2003 A1
20030130954 Carr et al. Jul 2003 A1
20040005093 Rhoads Jan 2004 A1
20040190750 Rodriguez et al. Sep 2004 A1
20040240704 Reed Dec 2004 A1
20040264733 Rhoads et al. Dec 2004 A1
20050041835 Reed et al. Feb 2005 A1
20050058318 Rhoads Mar 2005 A1
20050192933 Rhoads et al. Sep 2005 A1
20060013435 Rhoads Jan 2006 A1
20060041591 Rhoads Feb 2006 A1
20060251291 Rhoads Nov 2006 A1
20070055884 Rhoads Mar 2007 A1
20070108287 Davis et al. May 2007 A1
20070154064 Rhoads et al. Jul 2007 A1
20070276841 Rhoads et al. Nov 2007 A1
20070276928 Rhoads et al. Nov 2007 A1
20080121728 Rodriguez May 2008 A1
20080133555 Rhoads et al. Jun 2008 A1
20080292134 Sharma et al. Nov 2008 A1
20090012944 Rodriguez et al. Jan 2009 A1
20090116687 Rhoads et al. May 2009 A1
20090125475 Rhoads et al. May 2009 A1
20090232352 Carr et al. Sep 2009 A1
20090286572 Rhoads et al. Nov 2009 A1
20090290754 Rhoads Nov 2009 A1
20100027837 Levy et al. Feb 2010 A1
20100045816 Rhoads Feb 2010 A1
20100062819 Hannigan et al. Mar 2010 A1
20100094639 Rhoads Apr 2010 A1
20100142749 Ellingson et al. Jun 2010 A1
20100172540 Davis et al. Jul 2010 A1
20100198941 Rhoads Aug 2010 A1
Foreign Referenced Citations (2)
Number Date Country
766468 Apr 1997 EP
WO9627259 Sep 1996 WO
Non-Patent Literature Citations (48)
Entry
“A Secure, Robust Watermark for Multimedia,” Cox et al., Lecture Notes in Computer Science, Springer, vol. 1174/1996, pp. 185-206, 1996.
Definition of “mean,” Mathematical Concepts Inc. Key Port, NJ Copyright 1999, Taken from the dictionary “Math Spoken Here!” 1995, ISBN: 0-9623593-5-1.
Boland et al, Watermarking Digital Images for Copyright Protection, Fifth International Conference on Image Processing and its Applications, Conf. Publ. No. 410, pp. 326-330, 1995.
Bors et al, Image Watermarking Using DCT Domain Constraints, Proc. IEEE Int. Conf. On Image Processing, vol. 3, pp, 231-234, 1996.
Bruckstein et al, A Holographic Transform Domain Image Watermarking Method, Circuits, Systems and Signal Processing, vol. 17, No. 3, pp. 361-389, 1998 (includes Bell Labs “Internal Memo” of Sep. 1994 as appendix).
Burgett et al, A Novel Method for Copyright Labeling Digitized Image Data, 12 pages, 1994.
Caronni, “Assuring Ownership Rights for Digital Images,” Proceedings of Reliable IT Systems/VIS '95. 1995 (originally “Ermitteln Unauthorisierter. Verteiler von Masehinenlesbaren Daten,” ETH (Zurich) Technical Report. Aug. 1993).
Cox et al. A Secure, Imperceptible Yet Perceptually Salient, Spread Spectrum Watermark for Multimedia. IEEE, Southcon/96, Conference Record, pp. 192-197, 1996.
Cox et al, A Secure, Robust Watermark for Multimedia, Proc. Of First Int'l Workshop on Information Hiding, pp. 185-206. 1996.
Cox et al, Secure Spread Spectrum Watermarking for Images, Audio and Video, Proc. IEEE Int. Conf. On Image Processing, vol. 3, pp. 243-246, 1996.
Dautzenberg, “Watermarking Images,” Trinity College (Dublin) Dept. of Microelectronics and Electrical Engineering (47 pages), Oct. 1994.
Hsu et al, Hidden Signatures in Images, Proc. IEEE Int. Conf. On Image Processing, vol. 3, pp 223-226, 1996.
JPEG Group's JPEG Software (release 4), TP.CSUA.Berekeley.Edu./Pub/Cypherpunks/Applications/JSTEG/JPEG.Annouceme-nt.GZ.
Koch et al, Copyright Protection for Multimedia Data, Proc. Of the Int. Conf. On Digital Media and Electronic Publishing, Leeds, U.K., 15 pages, 1994.
Langelaar et al, “Real -Time Labeling Methods for MPEG Compressed Video,” Proc. 18.sup.th Symp. on Information Theory in the Benelux, May 1997, pp. 25-32.
Langelaar et al, “Robust Labeling Methods for Copy Protection of Images,” Proc. Storage and Retrieval for Image and Video Databases V, Feb. 13-14, 1997, San Jose, CA.
Nakamara et al, A Unified Coding Method of Image and Text data using Discrete Micropatterns, Electronics and Communications in Japan, Part 1, vol. 72, No. 4., pp. 50-56, 1989.
Szepanski “A Signal Theoretic Method for Creating Forgery-Proof Documents for Automatic Verification,” Proceedings 1979 Carnahan Conference on Crime Countermeasures, May 16, 1979, pp. 101-109.
Tanaka et al, A Visual Retrieval System With Private Information for Image Database, Proceeding Int. Conf. On DSP Applications and Technology, pp. 415-421, 1991.
Notice of Allowance on U.S. Appl. No. 11/695,523, mailed Jun. 3, 2011.
U.S. Appl. No. 09/413,117, filed Oct. 6, 1999, Geoffrey B. Rhoads.
U.S. Appl. No. 09/507,096, filed Feb. 17, 2000, Geoffrey B. Rhoads, et al.
U.S. Appl. No. 09/482,749, filed Jan. 13, 2000, Geoffrey B. Rhoads.
U.S. Appl. No. 09/343,104, filed Jun. 29, 1999, W. Perry, et al.
U.S. Appl. No. 09/697,009, filed Oct. 25, 2000, W. Perry, et al.
U.S. Appl. No. 09/633,587, filed Aug. 7, 2000, Geoffrey B. Rhoads, et al.
U.S. Appl. No. 09/567,405, filed May 8, 2000, Geoffrey B. Rhoads, et al.
U.S. Appl. No. 09/689,289, filed Oct. 11, 2000, Geoffrey B. Rhoads, et al.
U.S. Appl. No. 09/629,649, filed Aug. 1, 2000, J. Scott Carr, et al.
U.S. Appl. No. 09/552,998, filed Apr. 19, 2000, W. Perry, et al.
U.S. Appl. No. 09/697,015, filed Oct. 25, 2000, Bruce L. Davis.
U.S. Appl. No. 09/343,101, filed Jun. 29, 1999, Bruce L. Davis, et al.
Boucqueau et al., Equitable conditional access and copyright protection for image based on trusted third parties, Lecture Notes in Computer Science, Springer Berlin / Heidelberg, vol. 1052/1996, Session E: Multimedia Support, 15 pages, 1995.
Non-Final Office Action on U.S. Appl. No. 11/940,017, mailed Oct. 19, 2009.
Notice of Allowance on U.S. Appl. No. 11/940,017, mailed Feb. 4, 2011.
Non-Final Office Action on U.S. Appl. No. 11/695,523, mailed May 20, 2009.
Final Office Action on U.S. Appl. No. 11/695,523, mailed May 5, 2008.
Non-Final Office Action on U.S. Appl. No. 11/695,523, mailed Nov. 9, 2007.
Final Office Action on U.S. Appl. No. 11/695,523, mailed Dec. 7, 2009.
Non-Final Office Action on U.S. Appl. No. 11/695,523, mailed Jul. 20, 2010.
Non-Final Office Action on U.S. Appl. No. 11/695,523, mailed Dec. 10, 2010.
Non-Final Office Action on U.S. Appl. No. 09/367,797, mailed Sep. 30, 2003.
Non-Final Office Action on U.S. Appl. No. 09/367,797, mailed May 12, 2004.
Non-Final Office Action on U.S. Appl. No. 09/367,797, mailed Jan. 26, 2005.
Non-Final Office Action on U.S. Appl. No. 09/367,797, mailed Aug. 23, 2005.
Non-Final Office Action on U.S. Appl. No. 09/367,797, mailed Feb. 27, 2006.
Final Office Action on U.S. Appl. No. 09/367,797, mailed Dec. 1, 2006.
Notice of Allowance on U.S. Appl. No. 09/367,797, mailed May 9, 2007.
Related Publications (1)
Number Date Country
20080130944 A1 Jun 2008 US
Divisions (1)
Number Date Country
Parent 09367797 US
Child 11695523 US
Continuations (1)
Number Date Country
Parent 11695523 Apr 2007 US
Child 11877486 US