This invention relates to a method of embedding multiple watermarks into data signals, particularly, but not limited to, a method of embedding multiple watermarks into audio and/or video signals.
Embedding data into audio or video signals by means of watermarking technology is well known and is described in, for instance, Van der Veen M., Bruekers F., Haitsma J., Kalker T., Lemma A. and Oomen W., 2001, Robust, multi-functional and high-quality audio watermarking technology: Convention paper, presented at the 110th Convention of the AES, May 12-15, Amsterdam, The Netherlands, and Swanson M., Twefik A. and Boney L., 1998, Robust audio watermarking using perceptual masking: Signal Processing, 66, pp. 337-355, both of which are incorporated herein by reference.
In
In some implementations of the approach described above problems may be introduced when multi-marking signal Y. e.g. embedding multiple watermarks, i.e. stacking different watermark signals. If for example signal Y, with a data set D0 is watermarked again, or multi-marked, with data set D1, the detector 12 will not be able to retrieve either data set D0 or data set D1, or both Besides these three options, it may also be more difficult to retrieve both data sets Both watermarks D0 and D1 are said to have destructive interference.
It is an object of the present invention to address the above mentioned disadvantage.
According to a first aspect of the present invention a method of embedding a watermark in a signal comprises:
checking a signal to be watermarked for a two-part watermark, a first part of which comprises a first identifier portion and a second part of which comprises a first information portion;
on finding said two-part watermark, the method includes identifying the first identifier portion and selecting a different identifier portion from a set of identifier portions and combining the different identifier portion with an information portion of the watermark to be embedded; and
on finding no two-part watermark, the method includes selecting an identifier portion from the set of identifier portions and combining the identifier portion with the information portion of the watermark to be embedded;
the identifier and information portions are then combined to produce the watermark for embedding.
The information portion preferably includes a payload of the watermark, preferably having the information or instructional content of the watermark.
Preferably, the identifier portions are substantially orthogonal to one another, preferably there is substantially no destructive interference between identifier portions. Preferably, the identifier portions in the set of identifier portions are chosen to be orthogonal/non-interfering with each other.
The identifier portions may be carriers, in which case the information portions are used to modulate the identifier portions.
The method may include checking for more than one two-part watermark. Preferably, the method is operable to embed multiple two-part watermarks. Preferably, the method includes the selection of an identifier portion different to all identifier portion(s) of (an)other detected two-part watermark(s).
Preferably, the set of identifier portions is in the form of a list. Preferably, the first unused identifier portion in the list is used for combination with the information portion of the watermark to be embedded.
The watermark(s) may include a label portion, which label portion may indicate the next identifier portion to be used.
The identifier portions may be derived from a seed that indicates what the identifier portions are.
The watermark may be embedded using perception model techniques.
The method may include embedding multiple two-part watermarks.
According to a second aspect of the invention, a method of detecting a watermark in a signal comprises:
checking a signal of interest for at least one two-part watermark, a first part of each watermark comprising an identifier portion and at least one corresponding information portion;
checking the or each identifier portion for correspondence with an identifier portion in a set of known identifier portions;
extracting each identifier portion corresponding to a member of the set to give its corresponding information portion, to thereby allow use of the information portion.
The method preferably includes the detection of one or more two-part watermarks.
According to a third aspect, a watermark embedder operable to perform the method of the first aspect.
The watermark embedder may incorporate an identifier portion extractor, operable to extract the identifier portion from a two-part watermark.
The watermark embedder is preferably operable to supply an extracted identifier portion to an identifier portion generator, the latter preferably being operable to generate an identifier portion substantially different to the extracted identifier portion. The identifier portion generator preferably selects an identifier from a predetermined list.
The watermark embedder preferably includes a data combiner, operable to combine the identifier portion of a two-part watermark with an information portion thereof.
The watermark embedder preferably includes a signal/data combiner operable to combine the two-part watermark with a data signal to be watermarked.
According to a fourth aspect a watermark detector operable to perform the method of the second aspect.
The watermark detector preferably includes an identifier portion extractor as described in the third aspect.
The watermark detector preferably includes an identifier portion/information portion splitter operable to separate an extracted identifier portion from its corresponding information portion.
The watermark detector preferably includes a data extractor, which is preferably operable to extract a two-part watermark from a received signal.
According to a fifth aspect a recordable medium carrying data having a watermark embedded according to the first aspect.
All of the features described herein can be combined with any of the above aspects, in any combination.
For a better understanding of the invention and to show how the same may be brought into effect, specific embodiments will now be described, by way of example, with reference to the accompanying drawings, in which:
In order to enable a data signal, such as an audio or video signal, to be marked with multiple watermarks a set of different codes or keys is used within a given application field. The set of codes/keys is known to a watermark embedder 20 and a watermark detector 22. In each watermark embedding step, whether it is a first embedding step or a subsequent embedding step, a different key is used. The embedder 22 includes a data extractor 24 for determining which key or keys has or have been used previously. A data generator 26 then selects a new key from the set of known keys.
As shown in
It should be borne in mind that the number of watermarks that can be added to a signal is in practice limited, because eventually, given a sufficiently great number of watermarks, severe degradation of the signal X being watermarked will result. Consequently, the number of different watermarks to be included is limited, which number is the same or less than the number of private data sets Dpriv provided.
For a particular watermarking application a sufficient number of different private data sets Dpriv is defined and is stored in the embedder 20 and the detector 22. Prior to combining the total data set Dtot with the input signal X, the watermark embedder 20 evaluates the input signal X to determine what private data sets Dpriv have already been used. The input signal X is analysed with a private data extractor 24. On the basis of the results of the examination, a new private data set Dpriv is generated from the set stored in the private data generator 26 and is combined with the public data set Dpublic in a private/public data combiner 28. Thus, the signal Dtot is formed and is combined with the signal X in a signal/data combiner 30.
A perception model 32 may optionally be used in conjunction with the input signal X whilst the combination with Dtot is being performed. The use of a perception model 32 is the same as is well known in the prior art.
In the detector 22, a data splitter 34 generates a public output data section Dpublic for every private data set Dpriv in an incoming signal Y. The incoming signal Y is processed using a data extractor 36 which extracts the signal Dtot. Also, a private data extractor 24, the same as that in the embedder 20, extracts a private data set Dpriv, which is input into the private/public data splitter 34 to enable a signal of the public data set Dpublic to be output. Consequently, the detector 22 produces a series of public output data sets Dpublic, assuming that a number of private data sets are detected. For this reason a mechanism is required to indicate the origin or destination of the public data sets Dpublic. One way of solving this is to allocate address fields in the public data set Dpublic. Some cryptographic and/or error detection mechanism may be applied on the public data set, but this is optional. Any malicious user of a watermark detector should not be able to trace the address fields. Therefore, payload, or address fields may be encrypted. Moreover payload capacity may be used to transmit EEC bits, which will enhance detection performance.
A particular embodiment of the system more generally described above in relation to
Wi(k)=Ws(k)Xi(k),
where i indicates the frame number, Xi(k) the spectral representation of the frame signal Xi(n) and Wi(k), the resulting frequency domain watermark.
This equation is used on an audio signal that is segmented into frames and transformed to the frequency domain. The magnitudes of the Fourier coefficients are slightly modified by utilising a shifted watermark Ws(k).
In this algorithm the private data set Dpriv is represented by a carrier Ci that will be modulated (by modulator 39) by the public data set Dpublic. The signal/data combiner 30 shown in
In
A second watermark embedder B starts embedding its data at t=t0 and proceeds until t=t4. The carrier detector 38 (private data extractor 24) will not detect any carrier (private data set) in the period from t=t0 through to t=t1 so it proposes to use the first carrier (private data set) available in the carrier list 42; Dpriv=C0 for i=0. From t=t1 through t=t3 carrier (private data set) C0 will be detected as it is used by embedder A earlier. Therefore, it is proposed to use the second carrier (private data set) available in the carrier list 42; Dpriv=C1 for i=1. In the interval from t=t3 through to t=t4 no other carrier (private data set) will be detected and therefore embedder B will continue by using carrier (private data set) C0. The next watermark embedder C starts embedding its public data at t=t2 and proceeds until t=t5. With the same strategy as embedder B, the carrier's (private data set) C2, C1 and C0 are selected for the three time intervals, as shown in
In the examples of
An optional way in which to reduce the algorithmic complexity of the private data set detector 24 or carrier detector 38 is as follows. Next to the total data set Dtot additional information concerning the use of private data sets may be embedded in the signal. For example, it is possible to look ahead with the private data set extractor 24 in the embedder 20 and if some change in private data set usage is foreseen, this may be signalled explicitly in the watermark. Consequently, subsequent private data set extractors 24, both embedder 20 and detector 22 can use this signal instead of or as a support in performing private data set extraction operations. In relation to the above, it is deemed to be advantageous to spend a few bits of information content in the payload to announce that the key is about to change, because this better enables the embedder 20 of detector 22 to account for those changes.
In
The method may include the private data sets being generated from a seed for private data sets
In the method of inserting and detecting multiple watermarks disclosed above, significant advantages are derived because of the lack of interference, or minimised interference, between multiple watermarks. This provides advantages in that the audio or video signal to be watermarked can be the result of an editing process, which may comprise a composition of multiple original works, some of which already have an embedded watermark. In this case, the selected private data set may change in time, as described above.
The invention can be summarized as follows. In order to enable a data signal, such as an audio or video signal, to be marked with multiple watermarks a set of different codes or keys is used within a given application field. The set of codes/keys is known to a watermark embedder (20) and a watermark detector (22). In each watermark embedding step, whether it is a first embedding step or a subsequent embedding step, a different key is used. The embedder (22) includes a data extractor (24) for determining which key or keys has or have been used previously. A data generator (26) then selects a new key from the set of known keys.
Number | Date | Country | Kind |
---|---|---|---|
03100132.4 | Jan 2003 | EP | regional |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/IB03/06180 | 12/16/2003 | WO | 7/20/2005 |