Claims
- 1. A method comprising:
encoding a content object with a first, robust digital watermark, the first watermark conveying a first payload of one or more digital symbols, the first watermark being decodable notwithstanding at least certain corruptions of the encoded object; encoding the content object with a second digital watermark, the second watermark conveying a second payload of one or more digital symbols, the second watermark being encoded using a process that is reversible given an uncorrupted encoded content object and the second payload; wherein the second payload conveys data enabling substantial removal of the robust digital watermark from an uncorrupted version of the encoded content object.
- 2. The method of claim 1 wherein the second payload conveys data enabling complete removal of the first digital watermark from an uncorrupted version of the encoded content object.
- 3. The method of claim 2 wherein the second payload conveys an error signal characterizing how the encoded first digital watermark varies from an estimated value thereof.
- 4. The method of claim 2 wherein the second payload conveys encoding data related to the first digital watermark.
- 5. A method comprising:
receiving a content object encoded with first and second digital watermarks, the first and second watermarks conveying first and second payloads, respectively; decoding the first watermark to obtain the first payload, the first payload including first data; decoding the second watermark to obtain the second payload; processing the content object to remove the first watermark therefrom, yielding an intermediately-processed content object; through use of the first data, processing the intermediately-processed content object to remove the second watermark therefrom, yielding a processed content object; wherein said processed content object corresponds to the received content object without any watermarks.
- 6. The method of claim 5 wherein the second watermark is robust to certain object corruptions.
- 7. The method of claim 5 that includes:
generating an intermediate watermark by reference to the decoded second payload; scaling the intermediate watermark by reference to an encoding mask characterized by encoding mask parameters included in the first data, yielding a reconstruction of the second watermark; and removing said scaled watermark from the intermediately-processed content object.
- 8. The method of claim 7 that includes subtracting the scaled intermediate watermark from the intermediately-processed content object to yield the processed content object.
- 9. The method of claim 5 that includes:
generating an intermediate watermark by reference to the decoded second payload; processing the intermediate watermark in accordance with error signal data included in the first data; and compensating the intermediately-processed content object in accordance with said processed intermediate watermark to effect removal of the second watermark from the content object.
- 10. The method of claim 5 wherein one of said first or second payloads includes a first hash corresponding to the content object prior to watermarking, and the method includes:
generating a second hash from the processed content object; and comparing the first and second hashes to confirm accurate restoration of the content object to an original form.
- 11. The method of claim 5 wherein the content object comprises samples, and the first watermark provides an average payload capacity of more than 1 bit per sample.
- 12. The method of claim 5 wherein the content object comprises samples of N-bits each, and the first watermark provides an average payload capacity of more than N/8 bits per sample.
- 13. The method of claim 5 wherein the content object comprises samples, and the first watermark provides an average payload capacity of more than 2 bits per sample.
- 14. The method of claim 5 wherein the content object comprises samples of N-bits each, and the first watermark provides an average payload capacity of more than N/4 bits per sample.
- 15. A method comprising encoding a content object with a first digital watermark, the first watermark conveying a first payload of plural digital symbols, the first watermark being decodable notwithstanding at least certain corruptions of the encoded object, the payload including first data useful in characterizing changes made to the content object by encoding the first watermark therein so that such changes can later be reversed.
- 16. The method of claim 15 in which the first data includes data relating to one or more exceptions to a normal encoding process.
- 17. The method of claim 16 wherein said one or more exceptions includes a rail event in which a sample of the unencoded content object is too close to a limiting value to permit a full change thereto entailed by the normal encoding process.
- 18. The method of claim 15 in which the first data includes data relating to a perceptual mask used to encode the content object.
- 19. The method of claim 15 in which the first data includes error information.
- 20. A method comprising:
decoding a steganographic watermark from a watermark-encoded content object, the watermark conveying plural-symbol payload data, said payload data including first data that partially characterizes changes made to the content object by encoding the first watermark therein; by reference to said first data, producing a version of said content object having the watermark encoding substantially removed.
- 21. The method of claim 20 that includes, by reference to said first data, producing a version of said content object having the watermark encoding completely removed.
- 22. A method comprising:
encoding a content object with a first digital watermark, the first watermark conveying a first payload of plural digital symbols, the first watermark being decodable notwithstanding at least certain corruptions of the encoded object; and transmitting first data to a second processor, the first data including data that partially characterizes changes made to the content object by encoding the first watermark therein, the first data being useful in substantially removing the first digital watermark from the encoded object at said second processor.
- 23. The method of claim 22 wherein the first data is useful in completely removing the first digital watermark from the encoded object at said second processor.
- 24. The method of claim 22 that includes transmitting said first data among the plural digital symbols of the first watermark.
- 25. A method of processing a content object encoded with frail and robust digital watermarks, each watermark conveying a data payload, the robust watermark being adapted to survive at least certain object corruptions, the method comprising:
removing the robust watermark from the content object to provide an intermediate object; and decoding, from the intermediate object, the payload conveyed by the frail watermark.
- 26. The method of claim 25 that further comprises removing the frail watermark from the intermediate object, thereby yielding a content object without any watermarking artifact.
- 27. A method comprising:
receiving a first content object, the first object being steganographically encoded with a first robust digital watermark conveying first payload information; decoding the first watermark, and storing at least certain of said payload information; removing the first digital watermark from the object by reference to the decoded payload information and watermark encoding parameters; changing the content object from which the first watermark has been removed; storing data relating to the changes in an audit log; encoding the changed content object with a second robust digital watermark, the second watermark conveying second payload information different than the first payload information.
- 28. The method of claim 27 wherein the first payload information includes a content identifier, and the second payload information includes a different content identifier.
- 29. The method of claim 27 in which the first content object is also steganographically encoded with a reversible watermark conveying third payload information.
- 30. The method of claim 27 wherein the first content object steganographically conveys address data pointing to a database record associated with said object.
- 31. The method of claim 30 that includes accessing the audit log by reference to said address data.
- 32. The method of claim 27 wherein the first object steganographically conveys said watermark encoding parameters.
- 33. The method of claim 27 that includes obtaining said parameters from a data store associated with said audit log.
RELATED APPLICATION DATA
[0001] This application claims priority to each of the following applications:
[0002] Provisional application 60/340,651, filed Dec. 13, 2001.
[0003] Provisional application 60/______ , filed Dec. 2, 2002, entitled Applications of Reversible Watermarking by Tian et al (Attorney Docket P0723);
[0004] Provisional application 60/______ , filed Dec. 2, 2002, entitled Reversible Watermarking by Tian et al (Attorney Docket P0719); and
[0005] Application 10/______ , filed Dec. 12, 2002, entitled Reversible Watermarking by Tian et al (Attorney Docket P752).
Provisional Applications (1)
|
Number |
Date |
Country |
|
60340651 |
Dec 2001 |
US |