This application claims the right of priority under 35 U.S.C. § 119 based on Australian Patent Application No. PS2068, filed May 1, 2002, which is incorporated by reference herein in its entirety as if fully set forth herein.
The present invention relates generally to steganographic embedding of data in digital images and, in particular, to the authentication of digital images using steganographically embedded data.
Several device types are now available for recording images on digital media, including digital still cameras, digital video cameras, and even mobile phones and Pocket Data Assistants (PDAs). Digital cameras in particular are becoming increasingly popular because they are more convenient to use than film cameras, and the price of digital cameras continues to drop, while the quality of images produced by digital cameras is now approaching that of film.
One feature of digital data is the ease with which such data can be manipulated or modified. This creates a difficulty that it is easy to modify a captured image to create a false representation of the original scene or event. There is a desire to guard against such modification of images, and particularly in fields such as forensics, insurance, and legal or law enforcement, where it is essential to prove the authenticity of images.
Conventional approaches to proving authenticity of digital data have involved the use of digital signatures based on cryptography. A digital signature signed with a private key is typically added to the image data so that the data can be authenticated by verifying the signature using the associated public key. This has the drawback that the authentication data may easily be separated from the image data. It is therefore desirable to have a means of authenticating image data without referring to any authentication data that may be separated from the image data.
Another approach to proving the authenticity of an image is to embed a digital signature in the image through the use of steganography. Steganography is the art and science of hiding information such that the presence of such information cannot be detected. The digital signature is typically based on a hash of the raw image data encrypted with a private key.
A known way of embedding the digital signature in the image is to embed the digital signature in a removable watermark. A watermark image is embedded in the image when the image is captured and may be embedded by the image capture device. Removable watermarks are embedded into an image by using a reversible operation to modify one or more colour components of the pixel data of the image. One known method is to add the watermark image to the image data using modulo 2n addition, where n is the number of bits used to store the relevant colour component.
To authenticate the image, the watermark pattern used for creating the watermark image has to be known. The watermark positions are detected using a correlation of the known watermark pattern with the watermarked image. The original watermark image is then reproduced and subtracted to recover the original image. Finally the signature can be verified using the public key of the source. This is typically done by re-calculating the hash of the image and comparing it to the result of decrypting the stored signature with the public key. If the values are the same, the image is authentic.
A problem with the above-mentioned solution is that the modulo 2n addition of the watermark is likely to cause some large component values to wrap around, resulting in a small value in the watermarked image. This may be highly visible. For example, adding the watermark may make some regions that are lightly coloured in the original image become very dark in the watermarked image, resulting in highly visible changes to parts of the image.
Another problem with this solution is that because the process of detecting the watermark uses correlation, the detection process is not always reliable, as it is affected by the characteristics of the image itself. The watermark must be detected exactly to enable it to be removed. A known solution to this problem is to increase the amplitude of the watermark until the watermark becomes reliably detectable. This typically involves repeated insertion and detection operations until a suitable amplitude value is found. Unfortunately, this makes the process of inserting the authentication data inefficient.
Another approach to image authentication is to embed a fragile watermark in the image that is destroyed by modification of the image data. If the watermark can be detected, the image must be authentic. This approach is not as secure as one using digital signatures.
Other approaches to steganographically embedding information in images are based on modification of compressed images. Images are often stored in a compressed form, and the compression algorithms typically used are “lossy”, i.e. the original image cannot be exactly recovered from the compressed form. These approaches have the disadvantage that the quality of the image is reduced by the compression process. There is a demand amongst professional photographers for high quality images, and these are the kinds of images for which authentication is likely to be required. Thus there is a need for reliable authentication of uncompressed images.
It is an object of the present invention to substantially overcome, or at least ameliorate, one or more disadvantages of existing arrangements.
According to a first aspect of the invention, there is provided a method of embedding information in a digital image, said method comprising the steps of:
a) defining a candidate set of incoherent pixel groups in said image, each pixel group comprising at least two pixels;
b) selecting a subset of said candidate set of pixel groups using a predefined selection criterion;
c) assigning an integer colour value to each of a plurality of colours;
d) embedding said information in said image by modifying colour values of pixels of said selected subset of pixel groups such that said information is embedded in accordance with the order of said integer colour values corresponding to said colour values after modification.
According to another aspect of the invention, there is provided a method of extracting information embedded in a digital image, said method comprising the steps of:
a) defining a candidate set of incoherent pixel groups in said image, each pixel group comprising at least two pixels;
b) selecting a subset of said candidate set of pixel groups using a predefined selection criterion; and
c) assigning an integer colour value to each of a plurality of colours; and
d) extracting said information from said image by assessing the colour values of pixels of said selected subset of pixel groups such that said information is extracted in accordance with the order of said integer colour values.
According to still another aspect of the invention, there is provided a method of embedding a digital signature in a digital image, said method comprising the steps of:
a) defining a candidate set of incoherent pixel groups in said image, each pixel group comprising at least two pixels;
b) selecting a subset of said candidate set of pixel groups using a predefined selection criterion, wherein pixel groups having at least two pixels with non-distinct colour values are excluded from said selection;
c) normalising colour values of pixels of the selected pixel groups;
d) calculating said digital signature;
e) assigning an integer colour value to each of a plurality of colours; and
f) embedding said digital signature in said image by interchanging colour values of pixels of said selected subset of pixel groups such that said digital signature is embedded in accordance with the order of said integer colour values corresponding to said colour values after interchanging.
According to still another aspect of the invention, there is provided a method of authenticating a digital image, said method comprising the steps of:
a) establishing a candidate set of incoherent pixel groups in said image, each pixel group comprising at least two pixels;
b) selecting a subset of said candidate set of pixel groups using a predefined selection criterion, wherein pixel groups having at least two pixels with non-distinct colour values are excluded from said selection;
c) assigning an integer colour value to each of a plurality of colours;
d) extracting said digital signature from said image by assessing the colour values of pixels of said selected subset of pixel groups such that said digital signature is extracted in accordance with the order of said integer colour values;
e) calculating a first hash value from said digital signature;
f) normalising colour values of pixels of the selected pixel groups;
g) calculating a second hash value from the normalised image; and
h) authenticating said digital image by comparing said first and second hash values.
According to still another aspect of the invention, there is provided a method of embedding a digital signature in a digital image, said method comprising the steps of:
a) normalising colour values of pixels of said digital image;
b) calculating said digital signature from said normalised image; and
c) embedding said digital signature into said normalised image.
According to still another aspect of the invention, there is provided a method of authenticating a digital image, said method comprising the steps of:
a) extracting an embedded digital signature from said digital image;
b) calculating a first hash value from said digital signature;
c) normalising colour values of pixels of said image;
d) calculating a second hash value from the normalised image; and
e) authenticating said digital image by comparing said first and second hash values.
According to still another aspect of the invention, there is provided an apparatus for embedding information in a digital image, said apparatus comprising:
means for defining a candidate set of incoherent pixel groups in said image, each pixel group comprising at least two pixels;
means for selecting a subset of said candidate set of pixel groups using a predefined selection criterion; and
means for assigning an integer colour value to each of a plurality of colours; and
means for embedding said information in said image by modifying colour values of pixels of said selected subset of pixel groups such that said information is embedded in accordance with the order of said integer colour values corresponding to said colour values after modification.
According to still another aspect of the invention, there is provided an apparatus for extracting information embedded in a digital image, said apparatus comprising:
means for defining a candidate set of incoherent pixel groups in said image, each pixel group comprising at least two pixels;
means for selecting a subset of said candidate set of pixel groups using a predefined selection criterion;
means for assigning an integer colour value to each of a plurality of colours; and
means for extracting said information from said image by assessing the colour values of pixels of said selected subset of pixel groups such that said information is extracted in accordance with the order of said integer colour values.
According to still another aspect of the invention, there is provided an apparatus for embedding a digital signature in a digital image, said apparatus comprising:
means for defining a candidate set of incoherent pixel groups in said image, each pixel group comprising at least two pixels;
means for selecting a subset of said candidate set of pixel groups using a predefined selection criterion, wherein pixel groups having at least two pixels with non-distinct colour values are excluded from said selection;
means for normalising colour values of pixels of the selected pixel groups;
means for calculating said digital signature;
means for assigning an integer colour value to each of a plurality of colours; and
means for embedding said digital signature in said image by interchanging colour values of pixels of said selected subset of pixel groups such that said digital signature is embedded in accordance with the order of said integer colour values corresponding to said colour values after interchanging.
According to still another aspect of the invention, there is provided an apparatus for authenticating a digital image, said apparatus comprising:
means for establishing a candidate set of incoherent pixel groups in said image, each pixel group comprising at least two pixels;
means for selecting a subset of said candidate set of pixel groups using a predefined selection criterion, wherein pixel groups having at least two pixels with non-distinct colour values are excluded from said selection;
means for assigning an integer colour value to each of a plurality of colours;
means for extracting said digital signature from said image by assessing the colour values of pixels of said selected subset of pixel groups such that said digital signature is extracted in accordance with the order of said integer colour values;
means for calculating a first hash value from said digital signature;
means for normalising colour values of pixels of the selected pixel groups;
means for calculating a second hash value from the normalised image; and
means for authenticating said digital image by comparing said first and second hash values.
According to still another aspect of the invention, there is provided an apparatus for embedding a digital signature in a digital image, said apparatus comprising:
means for normalising colour values of pixels of said digital image;
means for calculating said digital signature from said normalised image; and
means for embedding said digital signature into said normalised image.
According to still another aspect of the invention, there is provided an apparatus for authenticating a digital image, said apparatus comprising;
means for extracting an embedded digital signature from said digital image;
means for calculating a first hash value from said digital signature;
means for normalising colour values of pixels of said image;
means for calculating a second hash value from the normalised image; and
means for authenticating said digital image by comparing said first and second hash values.
According to still another aspect of the invention, there is provided a program stored in a memory medium for embedding information in a digital image, said program comprising:
code for defining a candidate set of incoherent pixel groups in said image, each pixel group comprising at least two pixels;
code for selecting a subset of said candidate set of pixel groups using a predefined selection criterion; and
code for assigning an integer colour value to each of a plurality of colours; and
code for embedding said information in said image by modifying colour values of pixels of said selected subset of pixel groups such that said information is embedded in accordance with the order of said integer colour values corresponding to said colour values after modification.
According to still another aspect of the invention, there is provided a program stored in a memory medium for extracting information embedded in a digital image, said program comprising:
code for defining a candidate set of incoherent pixel groups in said image, each pixel group comprising at least two pixels;
code for selecting a subset of said candidate set of pixel groups using a predefined selection criterion; and
code for assigning an integer colour value to each of a plurality of colours; and
code for extracting said information from said image by assessing the colour values of pixels of said selected subset of pixel groups such that said information is extracted in accordance with the order of said integer colour values.
According to still another aspect of the invention, there is provided a program stored in a memory medium for embedding a digital Signature in a digital image, said program comprising:
code for defining a candidate set of incoherent pixel groups in said image, each pixel group comprising at least two pixels;
code for selecting a subset of said candidate set of pixel groups using a predefined selection criterion, wherein pixel groups having at least two pixels with non-distinct colour values are excluded from said selection;
code for normalising colour values of pixels of the selected pixel groups;
code for calculating said digital signature; and
code for assigning an integer colour value to each of a plurality of colours; and
code for embedding said digital signature in said image by interchanging colour values of pixels of said selected subset of pixel groups such that said digital signature is embedded in accordance with the order of said integer colour values corresponding to said colour values after interchanging.
According to still another aspect of the invention, there is provided a program stored in a memory medium for authenticating a digital image, said program comprising:
code for establishing a candidate set of incoherent pixel groups in said image, each pixel group comprising at least two pixels;
code for selecting a subset of said candidate set of pixel groups using a predefined selection criterion, wherein pixel groups having at least two pixels with non-distinct colour values are excluded from said selection;
code for assigning an integer colour value to each of a plurality of colours;
code for extracting said digital signature from said image by assessing the colour values of pixels of said selected subset of pixel groups such that said digital signature is extracted in accordance with the order of said integer colour values;
code for calculating a first hash value from said digital signature;
code for normalising colour values of pixels of the selected pixel groups;
code for calculating a second hash value from the normalised image; and
code for authenticating said digital image by comparing said first and second hash values.
According to still another aspect of the invention there is provided a program stored in a memory medium for embedding a digital signature in a digital image, said program comprising:
code for normalising colour values of pixels of said digital image;
code for calculating said digital signature from said normalised image; and
code for embedding said digital signature into said normalised image.
According to still another aspect of the invention, there is provided a program stored in a memory medium for authenticating a digital image, said program comprising:
code for extracting an embedded digital signature from said digital image;
code for calculating a first hash value from said digital signature;
code for normalising colour values of pixels of said image;
code for calculating a second hash value from the normalised image; and
code for authenticating said digital image by comparing said first and second hash values.
Other aspects of the invention are also disclosed.
One or more embodiments of the present invention will now be described with reference to the drawings, in which:
Where reference is made in any one or more of the accompanying drawings to steps and/or features, which have the same reference numerals, those steps and/or features have for the purposes of this description the same function(s) or operation(s), unless the contrary intention appears.
Steganographically embedding and extracting of information in a digital image may be practiced using a system 200, a schematic block diagram of which is shown in
In the case where the system 200 is a general-purpose computer, the output device 215 generally includes a display device. A printer may also be provided. The controls 202 include a keyboard and a mouse. The storage device 209 typically includes a hard disk drive, a floppy disk drive and a CD-ROM drive.
The steganographic embedding and extracting of information in a digital image is typically controlled by an application program, which is resident on the storage device 209. The application program is read and controlled in its execution by the processor 205. Intermediate storage of the program may be accomplished using the semiconductor memory 206, possibly in concert with the storage device 209. In some instances, the application program may be supplied to the user encoded on a CD-ROM or floppy disk and read via a CD-ROM drive or floppy disk drive 211, or alternatively may be read by the user from a network (not illustrated).
The information to be steganographically embedded into the image may be any data representable as a bit string. For example, the information “B2” may be represented as bit string:
01000010 001100102 (1)
using the conventional 8-bit ASCII code, and has a length of 16 bits.
In broad terms, the method 100 of steganographically embedding information in the digital image is operative to select a number of pixel groups from a candidate set of pixel groups, and then embedding the information by selectively modifying the colour values of pixels of the selected pixel groups
Accordingly, the method 100 starts in step 115 where the processor 205 defines the candidate set of pixel groups in the digital image. The pixel groups are defined to be incoherent and each pixel group includes at least two image pixels. The definition of pixel groups must also be reproducible at a decoder.
In order to maximise the number of pixel groups available to select from for embedding the information, the defined candidate pixel groups should preferably cover as many image pixels as possible. Accordingly, the ideal definition of pixel groups is one that includes all the image pixels in pixel groups.
In the preferred implementation, the pixels of each candidate pixel group are spatially close to each other. An advantage of defining the candidate pixel groups such that their pixels are spatially close to each other is that, in typical photographic images, pixels that are spatially close to each other are more likely to have similar colour values. As would become clear in what follows, pixels having similar colour values require less modification in order to embed the information, which in turn makes such modification less visible. In a specific implementation, the candidate pixel groups consist of all vertically or horizontally adjacent pairs of pixels.
To avoid any visible artefacts in the digital image wherein the colour values have been modified to embed the information, the incoherent pixel groups defined in step 115 are preferably defined in a pseudo random manner. In the preferred implementation a predetermined repeating random pattern of tiles is used, such as the pattern illustrated in
The overall pattern is made up from a repeating pattern 301 of tiles.
A subset of the candidate incoherent pixel groups is next selected, with the number of selected pixel groups dependent on the amount of information to be embedded. For example, if each pixel group comprises two pixels, such as the pixel groups illustrated in
In one implementation a pseudo-random process may be used to select the subset of the candidate incoherent pixel groups. Preferably the modification to a typical photographic digital image is made as imperceptible to the human eye as possible, allowing the modified image to serve as an acceptable substitute for the original digital image. Accordingly, in the preferred implementation, those pixel groups which would have the least visible impact when the colours of their pixels are modified, are selected. In order to do so and referring again to
Step 120 then proceeds to sub-step 505 where a next pixel group is found. Sub-step 515 follows where the visibility value of the pixel group under consideration is calculated. The visibility value serves as a measure of how visible a modification of the colour values of the pixels in the pixel group would be.
After the visibility value of the pixel group under consideration is calculated in sub-step 515, sub-step 520 increments the visibility histogram entry indexed by that visibility value. Step 120 then proceeds to sub-step 525 where it is determined whether there are any more pixel groups left to be processed. If there are any pixel groups left, then step 120 returns control to sub-step 505 where the next pixel group is found.
If sub-step 525 determines that all pixel groups have been processed, then step 120 proceeds to sub-step 530 where a cumulative histogram of visibility values is calculated from the visibility histogram. The cumulative histogram tabulates the number of pixel groups with a visibility value less than or equal to any given visibility value.
Finally, in sub-step 535, the visibility threshold is determined from the cumulative histogram by finding the first value (i.e. smallest) in the cumulative histogram that represents a sufficient number of pixel groups to embed the information. For example, if each pixel group consists of two pixels then, in a specific implementation, each pixel group is used to embed one bit of information. In this implementation, the number of pixel groups required to embed the information is equal to the number of bits of information. In such a case the visibility threshold is the index of the first value in the cumulative histogram that is greater than the number of bits of information to be embedded.
Referring again to
If sub-step 620 determines that the calculated visibility value of the pixel group under consideration is smaller or equal to the visibility threshold, then the counter is incremented in sub-step 625, with the counter acting as an index of the current pixel group The index of the current pixel group is tested in sub-step 630 using a selection function to determine whether the pixel group should be selected for modification.
The pixel groups chosen by the selection function in sub-step 630 are preferably spread out across the image and the positions of the chosen pixel groups ideally should not conform to any visible pattern To achieve these aims, the pixel groups are preferably randomly chosen from those that have a visibility value smaller or equal to the visibility threshold. The chosen subset of pixel groups needs to be reproducible so that the information can be recovered. It is also desirable that pixel groups can be efficiently tested for inclusion in the subset in the order that the image data is stored to make memory access efficient. In the preferred implementation this is accomplished using a selection fiction based on the index of the pixel group. The selection function used depends on the number of pixel groups with visibility below the visibility threshold and on the number of pixel groups required to embed the information.
One implementation of a suitable selection function for sub-step 630 involves using pseudo-random permutations. It is assumed that all incoherent pixel groups with visibility below the visibility threshold are assigned a unique index in the range 0, . . . , N−1 where N is the number of incoherent pixel groups with visibility below the visibility threshold calculated in step 120. N may be determined in step 120 from the cumulative histogram calculated in sub-step 530. If a pixel group has index i, then the pixel group is selected by sub-step 635 if p(i)<R where R is the required number of pixel groups to embed the information, and p is a pseudo-random permutation of the numbers 0, . . . , N−1. One example of an efficient pseudo-random permutation p is the sequence produced by a linear congenital random number generator. If sub-step 630 determines that p(i)≧R then step 125 continues to sub-step 640.
Many other schemes for selecting an effectively random subset of a predetermined size R from a larger set of size N may be used.
Sub-step 640 determines whether there are any more pixel groups left to be processed. If there are any pixel groups left, then step 125 returns control to sub-step 610 where the next pixel group is found, alternatively step 125 ends.
Referring again to
An example of a scheme for assigning an integer colour value to a colour is to assign the integer colour value:
22nr+2ng+b (3)
to the colour having colour components (r, g, b) in the RGB colour space, where n is the number of bits used to represent each colour component. Many other schemes are possible. Preferably, each distinct colour is associated with a distinct integer colour value.
For example, in the case where the pixel group consists of two pixels, a ‘0’ bit may be embedded by modifying one or more of the colour values of the pixels of that pixel group, if necessary, so that the ‘first’ pixel in the predetermined order has a smaller integer colour value than the ‘second’ pixel in the predetermined order. Similarly, a ‘1’ bit is embedded by modifying one or more of the colour values of the pixels of that pixel group, if necessary, so that the ‘first’ pixel has a greater integer colour value than the ‘second’ pixel. A part of the information is embedded in each of the selected pixel groups in the same manner.
In the implementation illustrated in
In one implementation the colour values of the pixels of the pixel group are interchanged to have the desired order. In this implementation, the visibility value calculated in sub-step 515 (
|r1−r2|2+|g1−g2|2+|b1−b2|2 (2)
Preferably the visibility value is calculated by applying an adjustment function to the colour difference. The adjustment function is calculated using a table lookup and linear interpolation, and is designed to produce a 10-bit result. In one implementation the adjustment function is a quick approximation of a square root function. The adjustment function serves two purposes: it adjusts the colour difference to be a better indication of the perceived difference in colour; and it limits the range of possible visibility values to a small range of integer values, so that less storage is required for the visibility histogram. An advantage of interchanging the colour values of the pixels of the pixel group with pixels that are adjacent is that the local average colour does not change, making such modification of the colour values less perceptible.
However, if two or more pixels of that pixel group have non-distinct colour values, less information can be embedded in that pixel group, as interchanging colour values that are the same contains no information. Accordingly, pixel groups containing at least two pixels having non-distinct colour values should not be selected in step 125. To implement this, and referring first to
Referring now to
In another implementation, when the colour values of the pixels in the pixel group needs modification so that the integer colour values of the pixels in the pixel group has the desired order, except in the case where the colour values of the pixels are the same, the colour values of the pixels are modified to values closer to an average colour while the integer colour values of those pixels has the desired order. For example, if the respective colour values of two pixels to be modified are (58, 110, 165) and (52, 108, 170), and if Equation (3) is used to assign the integer colour values to colours, then the modified colour values may be (55, 110, 165) and (56, 108, 170) respectively, which changes the order of the integer colour values, but having a minimal visual impact on the resulting image. In the special case where the colour values of two pixels are the same, say (76, 27, 96), then only one pixel's colour values has to be changed. Preferably only one colour component of that pixel is changed. If Equation (3) is used to assign the integer colour values to colours, then a desired one of the pixels may be given the colour value (75, 27, 96) providing the correct relationship with minimum visual colour change.
Finally part of the information is extracted from each of the selected pixel groups in step 720 by comparing the order of the integer colour values assigned to the pixel colours of the pixels in each of the pixel groups.
The method of steganographically embedding information in a digital image may be used for authenticating the digital image by embedding a digital signature of the image in the image. A hash value may then be extracted and a hash value of the image may also be calculated. The extracted and calculated hash values may then be compared to verify whether the digital image is unchanged since the digital signature was embedded.
The method 800 starts in step 805 where the processor 205 defines the candidate set of incoherent pixel groups in the digital image, with each pixel group including at least two image pixels in a manner that is the same as that described in relation to step 115 (
The method 800 then determines a visibility threshold in step 810 in a manner that is the same as that described in relation to step 120 (
The colour values of the selected pixel groups are next normalised in step 820 by selectively interchanging the colour values of the pixels of the selected pixel groups so that they have a predefined order. For example, the colour values of the pixels of the selected pixel groups may be interchanged, if necessary, so that the integer colour values of the pixels in the pixel group has an ascending order.
In step 825 a hash value of the digital image with the normalised pixel groups is calculated, and the hash value is encrypted with a private key to form a digital signature. Any digital signature algorithm may be used, but in the preferred implementation a Digital Signature Standard (DSS) compliant signature is used.
The digital signature is then used as the information to be embedded in step 830 in a manner that is the same as that described in relation to step 130 (
Part of the embedded digital signature is extracted from each of the selected pixel groups in step 920 by comparing the order of the integer colour values assigned to the pixel colours of the pixels in each of the pixel groups. Before a hash value of the received image is calculated, the digital image is first normalised in step 925 by selectively interchanging the colour values of the pixels of the selected pixel groups so that they have the predefined order used by the digital signature embedding method 800. The hash value of the received image with the normalised pixel groups is calculated in step 930, and a decrypted hash value is obtained by applying the sender's public key to the extracted digital signature. The digital image can now be authenticated by comparing in step 935 the hash value calculated from the normalised image with the extracted hash obtained from the embedded digital signature. If the two hash values are the same, then the image is authentic, else the image has been changed since the digital signature has been embedded.
In another implementation the colour values of the selected pixel groups are normalised in steps 820 and 925, not by selectively interchanging the colour values of the pixels of the selected pixel groups so that they have a predefined order as in the previous implementation, but rather by assigning a same colour value to each of the pixels of the selected pixel groups. For example, the same colour value may be the colour value derived from performing the XOR function on the colour values of the pixels of each one of the selected pixel groups. To illustrate this example, let each pixel group comprise two pixels. For one of those pixel groups, let the colour values of the two pixels be (5, 20, 17) and (7, 21, 18) respectively in the RGB colour space. The same colour value assigned to those two pixels is then (5 7, 20 21, 17 18)=(2, 1, 3). It is important to note however that the colour values of the pixels of the pixel group that are modified in step 830 are the colour values before normalisation, those being (5, 20, 17) and (7, 21, 18) in the illustration. During the authentication of the digital image using method 900, and in particular during the normalisation of the colour values in step 925, the same normalisation used in step 820 (
The foregoing describes only some embodiments of the present invention, and modifications and/or changes can be made thereto without departing from the scope and spirit of the invention, the embodiments being illustrative and not restrictive.
Number | Date | Country | Kind |
---|---|---|---|
PS2068 | May 2002 | AU | national |
Number | Name | Date | Kind |
---|---|---|---|
5659726 | Sandford et al. | Aug 1997 | A |
5898799 | Murayama | Apr 1999 | A |
6005936 | Shimizu et al. | Dec 1999 | A |
6628801 | Powell et al. | Sep 2003 | B2 |
6879701 | Rhoads | Apr 2005 | B1 |
6957387 | Barbieri | Oct 2005 | B2 |
7089420 | Durst et al. | Aug 2006 | B1 |
7120274 | Kacker et al. | Oct 2006 | B2 |
Number | Date | Country | |
---|---|---|---|
20040017926 A1 | Jan 2004 | US |