Movatterモバイル変換


[0]ホーム

URL:


US20030070075A1 - Secure hybrid robust watermarking resistant against tampering and copy-attack - Google Patents

Secure hybrid robust watermarking resistant against tampering and copy-attack
Download PDF

Info

Publication number
US20030070075A1
US20030070075A1US10/194,278US19427802AUS2003070075A1US 20030070075 A1US20030070075 A1US 20030070075A1US 19427802 AUS19427802 AUS 19427802AUS 2003070075 A1US2003070075 A1US 2003070075A1
Authority
US
United States
Prior art keywords
watermark
frag
data
authentication
robust
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/194,278
Inventor
Frederic Deguillaume
Sviatoslav Voloshynovskiy
Thierry Pun
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to US10/194,278priorityCriticalpatent/US20030070075A1/en
Publication of US20030070075A1publicationCriticalpatent/US20030070075A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

The present invention relates to the methods for hybrid watermarking method joining a robust and a fragile watermark, and thus combining copyright protection, authentication and tamperproofing. As a result this approach is at the same time resistant against the copy attack. In addition, the fragile information is inserted in a way which preserves the resistance and reliability of the robust part.

Description

Claims (14)

We claim:
1. A method for generating watermarked data z based on some original data x, wherein said robust watermark w contains multi-bit informative winfand reference wrefwatermarks encoded and embedded in such a way as to resist against attacks, and an authentication watermark wfragcontextually encoded, encrypted and embedded in orthogonal or almost orthogonal positions with respect to the robust watermark w, comprising the steps of:
(a) encoding said multi-bit message b, possibly using any error correction code (ECC),
(b) generating said w as a function of said key k and said message b encoded and/or encrypted as codeword c, where said w consists in a said informative watermark winfand said reference watermark wref,
(c) generating said authentication watermark wfragas a function of said key k and said contextual information,
(d) embedding said robust watermark w into said original data x to get said robustly marked data y,
(e) embedding said authentication watermark wfraginto said robustly marked data y in orthogonal manner to said informative watermark winf, resulting into the final marked data z
whereby said reference watermark wrefassists amongst others in the estimation and recovering from local and global geometrical image alterations, channel state estimation, verification of reliability, fast detection of the said robust watermark w presence in said z and synchronized decoding of said error correction codes (ECC), and said authentication watermark wfragassists in tampering detection, authentication and prevention of estimation of robust watermark w or informative watermark winfwith following copying to another target media known as the copy attack, and identification of the reliability of said informative watermark winf, and furthermore whereby said z is visually indistinguishable from said x.
2. The method ofclaim 1 wherein said function uses perceptual masking M while adding said watermark w and said authentication watermark wfragto said x in the spatial domain or some transform domain.
3. The method ofclaim 1 wherein said authentication watermark wfragcontains global and/or local encrypted contextual information about data x such as data size, unique data ID, name, index or random unique stamp that is the same for one data but is different to another data to resist against collage attack and copy attack, and produces local data dependent signatures or local message digest code (MDC).
4. The method ofclaim 1 and3 wherein said unique stamp additionally carries information about date, time and other specific information identifying the particularities of embedding process that even enables the identification of copied areas and their localization.
5. The method ofclaim 1 wherein said encoded and encrypted authentication watermark wfraguses as input global and local information about the original data x and/or the robustly watermarked data y, including local blocks of the data, local blocks indexes, data global size, etc., and wherein all key dependent positions and bit planes where said authentication watermark wfragis to be embedded are excluded from the information used as input for the generation of this wfrag.
6. The method ofclaim 1 wherein said encoded and encrypted authentication watermark wfragcomprises a key-dependent regular (such as square blocks), or any irregular spatial allocation structure.
7. The method of claims1,5 and6 wherein said blocks are hashed using information about neighboring blocks to defeat simple substitution attacks and cut-and-paste attacks.
8. The method of claims1 wherein said authentication watermark wfragis embedded into contiguous and non-overlapping blocks with predefined indexes which may be generally key-dependent.
9. The method ofclaim 1 wherein said informative winfand authentication watermarks wfragare used jointly to detect the collage and the copy attacks that can not be achieved only based on their independent usage.
10. The method ofclaim 1 and9 wherein said informative winfand authentication wfragwatermarks are used jointly on the local blockwise level to detect the sequence of the applied attacks and to distinguish the multiple watermarks embedded with the same technology and the same key but possibly with different messages, and to identify the original informative message b initially embedded into said media x.
11. The method ofclaim 1 wherein said informative watermark winfand/or authentication watermark wfragis used to detect the tampered regions or the boundaries of objects, which have been copied from other medias even with the preservation of their block indexes and positions.
12. The method ofclaim 1 wherein said original data x is video, audio or image data.
13. The method ofclaim 1 applied to video data, wherein a plurality of watermarked video frames is generated.
14. The method ofclaim 1 wherein said function operates in the spatial domain, Discrete Cosine Transform (DCT) domain, Discrete Fourier Transform (DFT) domain, wavelet domain, or any other transform domain, or some combination thereof.
US10/194,2782001-10-042002-07-15Secure hybrid robust watermarking resistant against tampering and copy-attackAbandonedUS20030070075A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US10/194,278US20030070075A1 (en)2001-10-042002-07-15Secure hybrid robust watermarking resistant against tampering and copy-attack

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US32709701P2001-10-042001-10-04
US10/194,278US20030070075A1 (en)2001-10-042002-07-15Secure hybrid robust watermarking resistant against tampering and copy-attack

Publications (1)

Publication NumberPublication Date
US20030070075A1true US20030070075A1 (en)2003-04-10

Family

ID=23275145

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US10/194,278AbandonedUS20030070075A1 (en)2001-10-042002-07-15Secure hybrid robust watermarking resistant against tampering and copy-attack
US10/491,681Expired - LifetimeUS7664288B2 (en)2001-10-042002-10-02Digital watermarking method robust against local and global geometric distortions and projective transforms

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US10/491,681Expired - LifetimeUS7664288B2 (en)2001-10-042002-10-02Digital watermarking method robust against local and global geometric distortions and projective transforms

Country Status (3)

CountryLink
US (2)US20030070075A1 (en)
EP (1)EP1444653B1 (en)
WO (1)WO2003032254A1 (en)

Cited By (80)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030118208A1 (en)*2001-12-202003-06-26Koninklijke Philips Electronics N.V.Varying segment sizes to increase security
US20030152225A1 (en)*2002-02-132003-08-14Sanyo Electric Co., Ltd.Digital watermarking system using scrambling method
US20040042635A1 (en)*2002-09-032004-03-04Koninklijke Philips Electronics N.V.Copy protection via redundant watermark encoding
US20040071311A1 (en)*2000-12-092004-04-15Jong-Uk ChoiNetwork camera apparatus, network camera server and digital video recorder for preventing forgery and alteration of a digital image, and apparatus for authenticating the digital image from said apparatus, and method thereof
US20040136528A1 (en)*2002-12-272004-07-15Kabushiki Kaisha ToshibaDigital watermark embedding apparatus, method and program, and digital watermark detection apparatus, method and program
US6834344B1 (en)*1999-09-172004-12-21International Business Machines CorporationSemi-fragile watermarks
US20050108535A1 (en)*2002-02-192005-05-19Bruekers Alphons Antonius M.L.Collusion-robust watermarking
US20050129269A1 (en)*2003-12-102005-06-16Jyh-Han LinContext watermark for digital contents
US20060075241A1 (en)*2004-09-272006-04-06Frederic DeguillaumeCharacter and vector graphics watermark for structured electronic documents security
US20060195886A1 (en)*2003-07-262006-08-31Koninklijke Philips Electronics N.V.Content identification for broadcast media
US20070009134A1 (en)*2003-08-082007-01-11Ebroul IzquierdoMethod and apparatus for fragile watermarking
US20070230708A1 (en)*2004-04-272007-10-04Koninklijke Philips Electroncs N.V.Watermarking a Compressed Information Signal
WO2007126180A1 (en)*2006-05-022007-11-08Electronics And Telecommunications Research InstituteMethod and apparatus for hybrid watermarking
US20080240435A1 (en)*2005-11-172008-10-02Mehmet Utku CelikPerpetual Masking For Secure Watermark Embedding
US20080297206A1 (en)*2005-11-182008-12-04Koninklijke Philips Electronics, N.V.Dc Offset Estimation
US20090060259A1 (en)*2007-09-042009-03-05Luis GoncalvesUpc substitution fraud prevention
EP2071822A1 (en)*2007-12-132009-06-17Thomson LicensingMethod and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks
WO2010021694A1 (en)*2008-08-202010-02-25Thomson LicensingSelection of watermarks for the watermarking of compressed video
US20110135143A1 (en)*2008-08-192011-06-09Dekun ZouContext-based adaptive binary arithmetic coding (cabac) video stream compliance
US20110142419A1 (en)*2008-08-192011-06-16Thomson LicensingChangeable block list
US20110145582A1 (en)*2009-12-112011-06-16Electronics And Telecommunications Research InstituteMethod for sharing and updating key using watermark
US20110176610A1 (en)*2008-08-192011-07-21Shan HePropagation map
CN102142073A (en)*2010-12-272011-08-03成都网安科技发展有限公司System for preventing and identifying disclosure of paper documents based on hidden watermarks
CN102142129A (en)*2011-03-092011-08-03西安理工大学Visual secret sharing-based image content tampering detection method
US20110228971A1 (en)*2010-03-222011-09-22Brigham Young UniversityRobust watermarking for digital media
US20110299725A1 (en)*2001-04-242011-12-08Rodriguez Tony FMethods involving maps, imagery, video and steganography
US20120269412A1 (en)*2009-09-182012-10-25Nanyang Technological UniversityMethod of providing security for transmitting a digital medical image
US20130067180A1 (en)*2011-09-122013-03-14Microsoft CorporationRetaining verifiability of extracted data from signed archives
US20130132729A1 (en)*2010-08-032013-05-23Thomson LicensingMethod and system for protecting by watermarking against non-authorised use original audio or video data which are to be presented
US20140270331A1 (en)*2013-03-152014-09-18Rimage CorporationContent watermarking
US8948443B2 (en)2008-08-192015-02-03Thomson LicensingLuminance evaluation
US20150052364A1 (en)*2012-03-082015-02-19Sandia CorporationIncreasing Security in Inter-Chip Communication
CN104486632A (en)*2014-12-312015-04-01四川九洲电器集团有限责任公司Video data processing method and video data detection method
WO2015030894A3 (en)*2013-06-202015-04-23Verance CorporationStego key management
US9105091B2 (en)2010-02-092015-08-11Thomson LicensingWatermark detection using a propagation map
US9117270B2 (en)1998-05-282015-08-25Verance CorporationPre-processed information embedding system
US9153006B2 (en)2005-04-262015-10-06Verance CorporationCircumvention of watermark analysis in a host content
US9189955B2 (en)2000-02-162015-11-17Verance CorporationRemote control signaling using audio watermarks
US9208334B2 (en)2013-10-252015-12-08Verance CorporationContent management using multiple abstraction layers
US9251549B2 (en)2013-07-232016-02-02Verance CorporationWatermark extractor enhancements based on payload ranking
US9262794B2 (en)2013-03-142016-02-16Verance CorporationTransactional video marking system
US9323902B2 (en)2011-12-132016-04-26Verance CorporationConditional access using embedded watermarks
US9596521B2 (en)2014-03-132017-03-14Verance CorporationInteractive content acquisition using embedded codes
WO2017058756A1 (en)*2015-09-282017-04-06EyeVerify Inc.Secure image pipeline
US9779227B1 (en)*2014-10-242017-10-03Amazon Technologies, Inc.Security system using keys encoded in holograms
EP3242239A1 (en)2016-05-022017-11-08Scantrust SAOptimized authentication of graphic authentication code
US20180089789A1 (en)*2015-09-282018-03-29EyeVerify Inc.Secure image pipeline
CN108470318A (en)*2018-02-062018-08-31杭州电子科技大学The three-dimensional grid doubly time series model method positioned based on grouping strategy and neighborhood relationships
CN109214425A (en)*2018-08-072019-01-15歌尔股份有限公司Picture verification method, image processing method, equipment and system
CN109285106A (en)*2018-10-112019-01-29中南大学 A reversible restoration method of medical images based on SLT-SVD
CN109785217A (en)*2018-12-252019-05-21湖南大学Error Control core water mark method based on FPGA technology
CN110288505A (en)*2019-06-302019-09-27湖南科技大学 Digital watermarking method for airspace vector geospatial data against geometric transformation attack
US10498542B2 (en)*2017-02-062019-12-03ShoCard, Inc.Electronic identification verification methods and systems with storage of certification records to a side chain
US10586055B2 (en)*2017-10-302020-03-10Paypal, Inc.Electronically backing up files using steganography
CN111667395A (en)*2020-06-032020-09-15南京师范大学Three-dimensional model copyright authentication method
CN112132731A (en)*2020-09-102020-12-25郑州轻工业大学DWT-SVD domain adaptive robust watermarking algorithm adopting preset PSNR
CN112313645A (en)*2018-08-102021-02-02深度来源公司 Learning method and testing method of data embedding network by synthesizing original data and labeled data to generate labeled data, and learning device and testing device using the same
US10979227B2 (en)2018-10-172021-04-13Ping Identity CorporationBlockchain ID connect
CN113014742A (en)*2021-02-092021-06-22安徽师范大学Image tampering detection positioning and self-recovery method based on fragile watermark
US11062106B2 (en)2016-03-072021-07-13Ping Identity CorporationLarge data transfer using visual codes with feedback confirmation
US11082711B2 (en)*2018-06-062021-08-03JVC Kenwood CorporationImage coding device, image coding method, and image falsification identification program
US11082221B2 (en)2018-10-172021-08-03Ping Identity CorporationMethods and systems for creating and recovering accounts using dynamic passwords
US11134075B2 (en)2016-03-042021-09-28Ping Identity CorporationMethod and system for authenticated login using static or dynamic codes
CN113469862A (en)*2021-05-282021-10-01安徽大学Tamper-proof digital watermark embedding method and image restoration method for file scanning
US11170130B1 (en)2021-04-082021-11-09Aster Key, LLCApparatus, systems and methods for storing user profile data on a distributed database for anonymous verification
US11206133B2 (en)2017-12-082021-12-21Ping Identity CorporationMethods and systems for recovering data using dynamic passwords
US11263415B2 (en)2016-03-072022-03-01Ping Identity CorporationTransferring data files using a series of visual codes
US11323266B2 (en)*2019-05-282022-05-03Brownie Technologies Ltd.System and method for secured digital communication using a digital signature
CN114493976A (en)*2022-04-152022-05-13湖北微模式科技发展有限公司JPEG image tampering detection method based on fragile watermark
CN114511437A (en)*2022-04-192022-05-17山东科技大学 Watermark Embedding and Image Self-Recovery Method Based on Reference Matrix and LSB Replacement
CN114549273A (en)*2022-02-282022-05-27中山大学Self-adaptive robust watermark embedding method and system based on deep neural network
CN114693500A (en)*2022-05-312022-07-01山东科技大学 A quantum image watermarking method for tamper detection and self-recovery
CN115422599A (en)*2022-08-052022-12-02湖南大学Integrity authentication semi-fragile watermarking method for cloud storage of three-dimensional geometric model
CN115443004A (en)*2022-09-162022-12-06Oppo广东移动通信有限公司 Waterproof and fragile sticker, electronic device and method for preparing electronic device
US11544367B2 (en)2015-05-052023-01-03Ping Identity CorporationSystems, apparatus and methods for secure electrical communication of biometric personal identification information to validate the identity of an individual
CN116825116A (en)*2023-07-182023-09-29合肥工业大学Robust audio watermark embedding and extracting method for resisting desynchronization attack
CN117057971A (en)*2023-10-072023-11-14湖北微模式科技发展有限公司JPEG image semi-fragile watermarking algorithm and device based on brightness shrinkage calibration
USRE49968E1 (en)*2017-02-062024-05-14Ping Identity CorporationElectronic identification verification methods and systems with storage of certification records to a side chain
CN118608367A (en)*2024-08-072024-09-06浙江大学 A watermark embedding and detection method and device for large model generated text
CN119544867A (en)*2024-09-252025-02-28天翼爱音乐文化科技有限公司 Color ring back tone audit method, device, electronic device and medium based on dual-mode watermark

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20110280434A1 (en)*2010-05-112011-11-17Rajesh MamidwarMethod and system for watermakr insertin using video start codes
EP2777247B1 (en)*2011-11-112019-06-12Optimark. LLCDigital communications
CN103093127B (en)*2013-01-212015-07-15深圳大学Method and system of dynamic copyright protection based on sudoku and multiple digital watermarks
CN103177219A (en)*2013-03-292013-06-26太原理工大学Medical biochemical detection report critical data tamper-proofing method
WO2018006095A2 (en)2016-07-012018-01-04Digimarc CorporationImage-based pose determination
US10902144B2 (en)*2017-08-252021-01-26Electronics And Telecommunications Research InstituteMethod and apparatus for securing data
EP3938994A4 (en)*2019-03-152023-01-18BOE Technology Group Co., Ltd. METHOD OF ENCODING A WATERMARK INTO A DIGITAL IMAGE, DEVICE FOR ENCODING A WATERMARK IN A DIGITAL IMAGE, METHOD OF DETECTING A WATERMARK IN A DIGITAL IMAGE, DEVICE FOR DETECTING A WATERMARK IN A DIGITAL IMAGE, AND COMPUTER PROGRAM PRODUCT
US10757292B1 (en)*2019-04-102020-08-25Beyontech, IncMethod of embedding and extracting watermark data from original image adjusted with noise based image converted using watermark

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6614914B1 (en)*1995-05-082003-09-02Digimarc CorporationWatermark embedder and reader
US7113615B2 (en)*1993-11-182006-09-26Digimarc CorporationWatermark embedder and reader
US5636292C1 (en)*1995-05-082002-06-18Digimarc CorpSteganography methods employing embedded calibration data
US6408082B1 (en)*1996-04-252002-06-18Digimarc CorporationWatermark detection using a fourier mellin transform
US5862260A (en)*1993-11-181999-01-19Digimarc CorporationMethods for surveying dissemination of proprietary empirical data
ATE418233T1 (en)1995-05-082009-01-15Digimarc Corp METHOD FOR EMBEDDING MACHINE READABLE STEGANOGRAPHIC CODE
US6282299B1 (en)*1996-08-302001-08-28Regents Of The University Of MinnesotaMethod and apparatus for video watermarking using perceptual masks
IT1308273B1 (en)1999-04-162001-12-10Univ Firenze METHOD OF DETECTION OF A BRAND IN DIGITAL IMAGES
US6385329B1 (en)*2000-02-142002-05-07Digimarc CorporationWavelet domain watermarks
US7251256B1 (en)*2000-05-182007-07-31Luminous Networks, Inc.Synchronization of asynchronous networks using media access control (MAC) layer synchronization symbols
AU2000260104A1 (en)*2000-08-032002-02-18Digital Copyright Technologies AgMethod for adaptive digital watermarking robust against geometric transforms
US6483927B2 (en)*2000-12-182002-11-19Digimarc CorporationSynchronizing readers of hidden auxiliary data in quantization-based data hiding schemes
US7024018B2 (en)*2001-05-112006-04-04Verance CorporationWatermark position modulation
US6904151B2 (en)*2002-01-172005-06-07Deguillaume FredericMethod for the estimation and recovering of general affine transform

Cited By (116)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9117270B2 (en)1998-05-282015-08-25Verance CorporationPre-processed information embedding system
US6834344B1 (en)*1999-09-172004-12-21International Business Machines CorporationSemi-fragile watermarks
US9189955B2 (en)2000-02-162015-11-17Verance CorporationRemote control signaling using audio watermarks
US20040071311A1 (en)*2000-12-092004-04-15Jong-Uk ChoiNetwork camera apparatus, network camera server and digital video recorder for preventing forgery and alteration of a digital image, and apparatus for authenticating the digital image from said apparatus, and method thereof
US8976998B2 (en)*2001-04-242015-03-10Digimarc CorporationMethods involving maps, imagery, video and steganography
US9792661B2 (en)2001-04-242017-10-17Digimarc CorporationMethods involving maps, imagery, video and steganography
US20110299725A1 (en)*2001-04-242011-12-08Rodriguez Tony FMethods involving maps, imagery, video and steganography
US20030118208A1 (en)*2001-12-202003-06-26Koninklijke Philips Electronics N.V.Varying segment sizes to increase security
US7006658B2 (en)*2001-12-202006-02-28Koninklijke Philips Electronics N.V.Varying segment sizes to increase security
US7487356B2 (en)*2002-02-132009-02-03Sanyo Electric Co., Ltd.Digital watermarking system using scrambling method
US20030152225A1 (en)*2002-02-132003-08-14Sanyo Electric Co., Ltd.Digital watermarking system using scrambling method
US20050108535A1 (en)*2002-02-192005-05-19Bruekers Alphons Antonius M.L.Collusion-robust watermarking
US7133534B2 (en)*2002-09-032006-11-07Koninklijke Philips Electronics N.V.Copy protection via redundant watermark encoding
US20040042635A1 (en)*2002-09-032004-03-04Koninklijke Philips Electronics N.V.Copy protection via redundant watermark encoding
US20040136528A1 (en)*2002-12-272004-07-15Kabushiki Kaisha ToshibaDigital watermark embedding apparatus, method and program, and digital watermark detection apparatus, method and program
US7646882B2 (en)*2002-12-272010-01-12Kabushiki Kaisha ToshibaDigital watermark embedding apparatus, method and program, and digital watermark detection apparatus, method and program
US20060195886A1 (en)*2003-07-262006-08-31Koninklijke Philips Electronics N.V.Content identification for broadcast media
US7489797B2 (en)2003-08-082009-02-10Motorola, Inc.Method and apparatus for fragile watermarking
US20070009134A1 (en)*2003-08-082007-01-11Ebroul IzquierdoMethod and apparatus for fragile watermarking
US20050129269A1 (en)*2003-12-102005-06-16Jyh-Han LinContext watermark for digital contents
US20070230708A1 (en)*2004-04-272007-10-04Koninklijke Philips Electroncs N.V.Watermarking a Compressed Information Signal
US7644281B2 (en)2004-09-272010-01-05Universite De GeneveCharacter and vector graphics watermark for structured electronic documents security
US20060075241A1 (en)*2004-09-272006-04-06Frederic DeguillaumeCharacter and vector graphics watermark for structured electronic documents security
US9153006B2 (en)2005-04-262015-10-06Verance CorporationCircumvention of watermark analysis in a host content
US20080240435A1 (en)*2005-11-172008-10-02Mehmet Utku CelikPerpetual Masking For Secure Watermark Embedding
US20080297206A1 (en)*2005-11-182008-12-04Koninklijke Philips Electronics, N.V.Dc Offset Estimation
US20090172404A1 (en)*2006-05-022009-07-02Electronics And Telecommunications Research InstituteMethod and Apparatus for Hybrid Watermarking
WO2007126180A1 (en)*2006-05-022007-11-08Electronics And Telecommunications Research InstituteMethod and apparatus for hybrid watermarking
US20090060259A1 (en)*2007-09-042009-03-05Luis GoncalvesUpc substitution fraud prevention
US8068674B2 (en)*2007-09-042011-11-29Evolution Robotics Retail, Inc.UPC substitution fraud prevention
EP2071822A1 (en)*2007-12-132009-06-17Thomson LicensingMethod and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks
WO2009074618A1 (en)*2007-12-132009-06-18Thomson LicensingMethod and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks
US20100254569A1 (en)*2007-12-132010-10-07Thomson LicensingMethod and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks
US8635161B2 (en)2007-12-132014-01-21Thomson LicensingMethod and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks
US20110176610A1 (en)*2008-08-192011-07-21Shan HePropagation map
US8594366B2 (en)2008-08-192013-11-26Thomson LicensingContext-based adaptive binary arithmetic coding (CABAC) video stream compliance
US9113231B2 (en)2008-08-192015-08-18Thomson LicensingChangeable block list
US20110142419A1 (en)*2008-08-192011-06-16Thomson LicensingChangeable block list
US20110135143A1 (en)*2008-08-192011-06-09Dekun ZouContext-based adaptive binary arithmetic coding (cabac) video stream compliance
US9042455B2 (en)2008-08-192015-05-26Thomson LicensingPropagation map
US8948443B2 (en)2008-08-192015-02-03Thomson LicensingLuminance evaluation
US20110158465A1 (en)*2008-08-202011-06-30Dekun ZouSelection of watermarks for the watermarking of compressed video
WO2010021694A1 (en)*2008-08-202010-02-25Thomson LicensingSelection of watermarks for the watermarking of compressed video
US8824727B2 (en)2008-08-202014-09-02Thomson LicensingSelection of watermarks for the watermarking of compressed video
US8818020B2 (en)*2009-09-182014-08-26Nanyang Technological UniversityMethod of providing security for transmitting a digital medical image
US20120269412A1 (en)*2009-09-182012-10-25Nanyang Technological UniversityMethod of providing security for transmitting a digital medical image
US8745399B2 (en)*2009-12-112014-06-03Electronics And Telecommunications Research InstituteMethod for sharing and updating key using watermark
US20110145582A1 (en)*2009-12-112011-06-16Electronics And Telecommunications Research InstituteMethod for sharing and updating key using watermark
US9105091B2 (en)2010-02-092015-08-11Thomson LicensingWatermark detection using a propagation map
US8588461B2 (en)*2010-03-222013-11-19Brigham Young UniversityRobust watermarking for digital media
US20110228971A1 (en)*2010-03-222011-09-22Brigham Young UniversityRobust watermarking for digital media
US20130132729A1 (en)*2010-08-032013-05-23Thomson LicensingMethod and system for protecting by watermarking against non-authorised use original audio or video data which are to be presented
CN102142073A (en)*2010-12-272011-08-03成都网安科技发展有限公司System for preventing and identifying disclosure of paper documents based on hidden watermarks
CN102142129A (en)*2011-03-092011-08-03西安理工大学Visual secret sharing-based image content tampering detection method
US20130067180A1 (en)*2011-09-122013-03-14Microsoft CorporationRetaining verifiability of extracted data from signed archives
US8819361B2 (en)*2011-09-122014-08-26Microsoft CorporationRetaining verifiability of extracted data from signed archives
US9323902B2 (en)2011-12-132016-04-26Verance CorporationConditional access using embedded watermarks
US20150052364A1 (en)*2012-03-082015-02-19Sandia CorporationIncreasing Security in Inter-Chip Communication
US9722796B2 (en)*2012-03-082017-08-01National Technology & Engineering Solutions Of Sandia, LlcIncreasing security in inter-chip communication
US9262794B2 (en)2013-03-142016-02-16Verance CorporationTransactional video marking system
US9773290B2 (en)*2013-03-152017-09-26Qumu CorporationContent watermarking
US9245310B2 (en)*2013-03-152016-01-26Qumu CorporationContent watermarking
US20160155208A1 (en)*2013-03-152016-06-02Qumu CorporationContent watermarking
US20140270331A1 (en)*2013-03-152014-09-18Rimage CorporationContent watermarking
US9485089B2 (en)2013-06-202016-11-01Verance CorporationStego key management
WO2015030894A3 (en)*2013-06-202015-04-23Verance CorporationStego key management
US9251549B2 (en)2013-07-232016-02-02Verance CorporationWatermark extractor enhancements based on payload ranking
US9208334B2 (en)2013-10-252015-12-08Verance CorporationContent management using multiple abstraction layers
US9596521B2 (en)2014-03-132017-03-14Verance CorporationInteractive content acquisition using embedded codes
US9779227B1 (en)*2014-10-242017-10-03Amazon Technologies, Inc.Security system using keys encoded in holograms
CN104486632A (en)*2014-12-312015-04-01四川九洲电器集团有限责任公司Video data processing method and video data detection method
US11544367B2 (en)2015-05-052023-01-03Ping Identity CorporationSystems, apparatus and methods for secure electrical communication of biometric personal identification information to validate the identity of an individual
US10931455B2 (en)*2015-09-282021-02-23EyeVerify Inc.Secure image pipeline
US20180089789A1 (en)*2015-09-282018-03-29EyeVerify Inc.Secure image pipeline
WO2017058756A1 (en)*2015-09-282017-04-06EyeVerify Inc.Secure image pipeline
US11658961B2 (en)2016-03-042023-05-23Ping Identity CorporationMethod and system for authenticated login using static or dynamic codes
US11134075B2 (en)2016-03-042021-09-28Ping Identity CorporationMethod and system for authenticated login using static or dynamic codes
US11544487B2 (en)2016-03-072023-01-03Ping Identity CorporationLarge data transfer using visual codes with feedback confirmation
US11263415B2 (en)2016-03-072022-03-01Ping Identity CorporationTransferring data files using a series of visual codes
US11062106B2 (en)2016-03-072021-07-13Ping Identity CorporationLarge data transfer using visual codes with feedback confirmation
EP3242239A1 (en)2016-05-022017-11-08Scantrust SAOptimized authentication of graphic authentication code
US11323272B2 (en)2017-02-062022-05-03Ping Identity CorporationElectronic identification verification methods and systems with storage of certification records to a side chain
USRE49968E1 (en)*2017-02-062024-05-14Ping Identity CorporationElectronic identification verification methods and systems with storage of certification records to a side chain
US11799668B2 (en)2017-02-062023-10-24Ping Identity CorporationElectronic identification verification methods and systems with storage of certification records to a side chain
US10498541B2 (en)*2017-02-062019-12-03ShocCard, Inc.Electronic identification verification methods and systems
US10498542B2 (en)*2017-02-062019-12-03ShoCard, Inc.Electronic identification verification methods and systems with storage of certification records to a side chain
US10586055B2 (en)*2017-10-302020-03-10Paypal, Inc.Electronically backing up files using steganography
US11206133B2 (en)2017-12-082021-12-21Ping Identity CorporationMethods and systems for recovering data using dynamic passwords
US11777726B2 (en)2017-12-082023-10-03Ping Identity CorporationMethods and systems for recovering data using dynamic passwords
CN108470318A (en)*2018-02-062018-08-31杭州电子科技大学The three-dimensional grid doubly time series model method positioned based on grouping strategy and neighborhood relationships
US11082711B2 (en)*2018-06-062021-08-03JVC Kenwood CorporationImage coding device, image coding method, and image falsification identification program
CN109214425A (en)*2018-08-072019-01-15歌尔股份有限公司Picture verification method, image processing method, equipment and system
CN112313645A (en)*2018-08-102021-02-02深度来源公司 Learning method and testing method of data embedding network by synthesizing original data and labeled data to generate labeled data, and learning device and testing device using the same
CN109285106A (en)*2018-10-112019-01-29中南大学 A reversible restoration method of medical images based on SLT-SVD
US11082221B2 (en)2018-10-172021-08-03Ping Identity CorporationMethods and systems for creating and recovering accounts using dynamic passwords
US11818265B2 (en)2018-10-172023-11-14Ping Identity CorporationMethods and systems for creating and recovering accounts using dynamic passwords
US10979227B2 (en)2018-10-172021-04-13Ping Identity CorporationBlockchain ID connect
US11722301B2 (en)2018-10-172023-08-08Ping Identity CorporationBlockchain ID connect
CN109785217A (en)*2018-12-252019-05-21湖南大学Error Control core water mark method based on FPGA technology
US11323266B2 (en)*2019-05-282022-05-03Brownie Technologies Ltd.System and method for secured digital communication using a digital signature
CN110288505A (en)*2019-06-302019-09-27湖南科技大学 Digital watermarking method for airspace vector geospatial data against geometric transformation attack
CN111667395A (en)*2020-06-032020-09-15南京师范大学Three-dimensional model copyright authentication method
CN112132731A (en)*2020-09-102020-12-25郑州轻工业大学DWT-SVD domain adaptive robust watermarking algorithm adopting preset PSNR
CN113014742A (en)*2021-02-092021-06-22安徽师范大学Image tampering detection positioning and self-recovery method based on fragile watermark
US11170130B1 (en)2021-04-082021-11-09Aster Key, LLCApparatus, systems and methods for storing user profile data on a distributed database for anonymous verification
CN113469862A (en)*2021-05-282021-10-01安徽大学Tamper-proof digital watermark embedding method and image restoration method for file scanning
CN114549273A (en)*2022-02-282022-05-27中山大学Self-adaptive robust watermark embedding method and system based on deep neural network
CN114493976A (en)*2022-04-152022-05-13湖北微模式科技发展有限公司JPEG image tampering detection method based on fragile watermark
CN114511437A (en)*2022-04-192022-05-17山东科技大学 Watermark Embedding and Image Self-Recovery Method Based on Reference Matrix and LSB Replacement
CN114693500A (en)*2022-05-312022-07-01山东科技大学 A quantum image watermarking method for tamper detection and self-recovery
CN115422599A (en)*2022-08-052022-12-02湖南大学Integrity authentication semi-fragile watermarking method for cloud storage of three-dimensional geometric model
CN115443004A (en)*2022-09-162022-12-06Oppo广东移动通信有限公司 Waterproof and fragile sticker, electronic device and method for preparing electronic device
CN116825116A (en)*2023-07-182023-09-29合肥工业大学Robust audio watermark embedding and extracting method for resisting desynchronization attack
CN117057971A (en)*2023-10-072023-11-14湖北微模式科技发展有限公司JPEG image semi-fragile watermarking algorithm and device based on brightness shrinkage calibration
CN118608367A (en)*2024-08-072024-09-06浙江大学 A watermark embedding and detection method and device for large model generated text
CN119544867A (en)*2024-09-252025-02-28天翼爱音乐文化科技有限公司 Color ring back tone audit method, device, electronic device and medium based on dual-mode watermark

Also Published As

Publication numberPublication date
WO2003032254A1 (en)2003-04-17
US20050018871A1 (en)2005-01-27
US7664288B2 (en)2010-02-16
EP1444653A1 (en)2004-08-11
EP1444653B1 (en)2015-06-03

Similar Documents

PublicationPublication DateTitle
US20030070075A1 (en)Secure hybrid robust watermarking resistant against tampering and copy-attack
Deguillaume et al.Secure hybrid robust watermarking resistant against tampering and copy attack
Holliman et al.Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
Voyatzis et al.Protecting digital image copyrights: a framework
JP5596193B2 (en) Method and apparatus for enhancing robustness of extracting watermark from digital host content
Lin et al.A review of data hiding in digital images
US7616776B2 (en)Methods and apparatus for enhancing the robustness of watermark extraction from digital host content
US6834344B1 (en)Semi-fragile watermarks
US20060239501A1 (en)Security enhancements of digital watermarks for multi-media content
Zhou et al.A semifragile watermark scheme for image authentication
Chandramouli et al.Digital watermarking
Chandra et al.Digital watermarking technique for protecting digital images
Chen et al.Combined digital signature and digital watermark scheme for image authentication
He et al.Synchronous counterfeiting attacks on self-embedding watermarking schemes
Al-Hamami et al.A new approach for authentication technique
Mursi et al.A DCT-based secure JPEG image authentication scheme
Abdul-SadaHiding data using LSB-3
MarvelInformation hiding: Steganography and watermarking
Memon et al.Authentication techniques for multimedia content
WolthusenOn the limitations of digital watermarks: a cautionary note
Voloshynovskiy et al.Multimedia security: open problems and solutions
Jiang et al.Semi-fragile watermarking algorithm for image tampers localization and recovery
LiDigital watermarking schemes for multimedia authentication
Sherekar et al.Critical Review of Perceptual Models for Data Authentication
Mursi et al.A Secure Semi-Fragile JPEG Image Authentication Scheme Based on Discrete Cosine Transform

Legal Events

DateCodeTitleDescription
STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp