Claims
- 1. A method of making available a content object at different quality levels to different recipients, comprising:
receiving an input content object; encoding the object with plural digital watermarks, each watermark contributing distortion to the object, each watermark being removable from the encoded object through use of key data associated therewith; and distributing the watermarked object to first and second recipients; wherein through use of first key data, the first recipient can remove a first watermark from the object, thereby removing distortion associated with said first watermark, and through use of second key data, the second recipient can remove a second watermark from the object, thereby removing distortion associated with said second watermark; wherein the different recipients can process the watermarked object with different key data to yield content of different quality.
- 2. The method of claim 1 that includes providing said first and second key data to the first and second recipients, respectively.
- 3. The method of claim 1 wherein the first and second key data are functions of digital credentials associated with the first and second recipients, respectively.
- 4. The method of claim 1 in which the second key data permits the second recipient to also remove the first watermark from the object, thereby removing distortion associated with said first watermark.
- 5. The method of claim 1 in which each of said digital watermarks steganographically conveys plural bits of information.
- 6. A method of making available a content object at different quality levels to different recipients, comprising:
providing the same watermark-encoded object to first and second recipients; through use of first key data associated with the first recipient, removing a first watermark from the encoded object, thereby providing the first recipient a version of the object having distortion associated with the first watermark removed therefrom; through use of second key data associated with the second recipient, removing a second watermark from the encoded object, thereby providing the second recipient a version of the object having distortion associated with the second watermark removed therefrom; wherein the different recipients process the watermarked object with different key data to yield content of different quality.
- 7. The method of claim 6 that includes providing said first and second key data to the first and second recipients, respectively.
- 8. The method of claim 6 wherein the first and second key data are functions of digital credentials associated with the first and second recipients, respectively.
- 9. The method of claim 6 that includes, through use of the second key data, also removing the first watermark from the encoded object, providing the second recipient a version of the object having distortion associated with both the first and second watermarks removed therefrom.
- 10. The method of claim 6 in which the first and second watermarks each steganographically conveys plural bits of information.
- 11. A method of making available different versions of a content object to different recipients, comprising:
providing the same object to first and second recipients, said object having at least a portion thereof of impaired quality; the first recipient using first key data to access a separate store of information having information useful in ameliorating said impairment, said first key data not being available to the second recipient; and using information from said separate store, ameliorating the impairment in the object provided to the first recipient; wherein the first and second recipients are provided different versions of the object.
- 12. The method of claim 11 in which the first key data permits the first recipient to decode a digital watermark in the object.
- 13. The method of claim 12 in which the decoded digital watermark contains information used in accessing said separate store of information.
- 14. The method of claim 11 wherein the first recipient uses data that is not known to the second recipient to decode plural-bit information from a watermark encoded in the object.
- 15. The method of claim 14 which the first key data is a function of said decoded information.
- 16. The method of claim 15 in which the first key data is also a function of a digital credential associated with the first recipient.
- 17. The method of claim 11 in which said portion of the object is encrypted, and the separate store of information includes a decryption key.
- 18. The method of claim 11 in which said portion of the object has been degraded by an obscuring additive overlay, and the separate store of information includes data by which this overlay can be removed.
- 19. The method of claim 11 in which the separate store holds a corresponding portion of said object without said impairment.
- 20. A method of making available different versions of a content object to different recipients, comprising:
providing the same object to first and second recipients, said image having at least a portion thereof of impaired quality, said object being encoded with a plural-bit digital watermark; the first recipient using first key data to access first payload data from the digital watermark, the first payload data comprising information useful in ameliorating said impairment, said first key data not being available to the second recipient; and using said information, ameliorating the impairment in the object provided to the first recipient; wherein the first and second recipients are provided different versions of the object.
- 21. The method of claim 20 in which said portion of the object is encrypted, and the first payload data comprises a decryption key.
- 22. The method of claim 20 in which said portion is encrypted, and the first payload data comprises a link to a repository at which a decryption key is stored.
- 23. The method of claim 20 in which:
the content object comprises a digital image; said portion is replaced with non-image data; and the first payload data comprises a link to a repository at which substitute image data is stored.
- 24. The method of claim 20 in which said portion has a graphic formed thereon, and the first payload data comprises a link to a repository at which data for removing said graphic is stored.
- 25. The method of claim 24 in which said repository has image data stored therein that can be combined with said portion to restore original object data.
- 26. The method of claim 20 in which:
the object comprises a digital image; said portion has a graphic formed thereon; and the first payload data includes pattern data identifying changed pixels comprising said graphic, so that a complementary process can be applied to reverse said impairment.
- 27. The method of claim 20 in which said watermark is frail, and cannot be read if the encoded object is further altered.
- 28. The method of claim 20 in which said watermark is reversible.
- 29. The method of claim 20 in which said portion of the object has been degraded by an obscuring additive overlay, and the first payload data comprises information through which this overlay can be removed from the image.
RELATED APPLICATION DATA
[0001] This application claims priority to each of the following applications:
[0002] Provisional application 60/340,651, filed Dec. 13, 2001.
[0003] Provisional application 60/______, filed Dec. 2, 2002, entitled Applications of Reversible Watermarking by Tian et al (Attorney Docket P0723);
[0004] Provisional application 60/______,filed Dec. 2, 2002, entitled Reversible Watermarking by Tian et al (Attorney Docket P0719); and
[0005] Application 10/______, filed Dec. 12, 2002, entitled Reversible Watermarking by Tian et al (Attorney Docket P752).
Provisional Applications (1)
|
Number |
Date |
Country |
|
60340651 |
Dec 2001 |
US |