CN103975605B - Watermark extracting based on tentative watermark - Google Patents

Watermark extracting based on tentative watermark Download PDF

Info

Publication number
CN103975605B
CN103975605B CN201280059704.5A CN201280059704A CN103975605B CN 103975605 B CN103975605 B CN 103975605B CN 201280059704 A CN201280059704 A CN 201280059704A CN 103975605 B CN103975605 B CN 103975605B
Authority
CN
China
Prior art keywords
watermark
distortion
predistortion
content
tentative
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201280059704.5A
Other languages
Chinese (zh)
Other versions
CN103975605A (en
Inventor
拉德·彼得罗维奇
文卡特拉曼·阿蒂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Verance Corp
Original Assignee
Verance Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/288,937 external-priority patent/US8615104B2/en
Priority claimed from US13/288,958 external-priority patent/US8533481B2/en
Priority claimed from US13/288,945 external-priority patent/US8923548B2/en
Priority claimed from US13/288,952 external-priority patent/US8682026B2/en
Application filed by Verance Corp filed Critical Verance Corp
Publication of CN103975605A publication Critical patent/CN103975605A/en
Application granted granted Critical
Publication of CN103975605B publication Critical patent/CN103975605B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8358Generation of protective data, e.g. certificates involving watermark
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • G10L19/018Audio watermarking, i.e. embedding inaudible data in the audio signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32352Controlling detectability or arrangements to facilitate detection or retrieval of the embedded information, e.g. using markers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0065Extraction of an embedded watermark; Reliable detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Computational Linguistics (AREA)
  • Theoretical Computer Science (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Acoustics & Sound (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

Method, apparatus and computer program product promote the extraction of embedded watermark in the case where being distorted there are content.The sync section of embedded watermarked frame is detected using predistortion synchronization template.The predistortion synchronization template of the sync section of embedded watermarked frame described in best match generates the estimation to being present in one or more distortions in content.The rest part of watermarked frame can be assessed based on result of the comparison.

Description

Watermark extracting based on tentative watermark
Related application
Present application is advocated to come from No. 13/288,937, No. 13/288,945, No. 13/288,952 and the 13/th The priority of 288, No. 958 U.S. patent application cases, the patent application case are filed an application on November 3rd, 2011.Before The full content of mentioned patent application case is incorporated by reference a part for the disclosure for present application.
Technical field
Present application generally relates to field of content management.More particularly, disclosed embodiment is related to coming from media The insertion and extraction of the watermark of content.
Background technology
This section is intended to provide the background or context of the disclosed embodiment stated in claims.Herein Illustrate concept that is may include to carry out but being not necessarily the concept for previously having dreamed up or having carried out.Therefore, unless separately having herein Instruction, otherwise the content described in this section in present application explanation and claims be not the prior art, and not Think that the prior art can be become due to comprising this section.
Watermark be essentially be embedded into content host can not perceptual signal.Content host can be appointing in the following terms One:Audio, static image, video can be stored on physical medium or be transmitted or broadcast to appointing for another point from a point One other contents.Watermark is designed to carrying auxiliary information, and does not substantially influence the fidelity of content host or do not interfere master The normal use of machine content.For this reason, covert communications are executed using watermark sometimes, is hidden wherein focusing on through hiding In the presence of signal.In addition, other extensive uses of watermark comprising:Prevent the use of the unauthorized of copyrighted multimedia content (for example, replicate, play and propagate), proof of ownership, verification, tampering detection, content integrity are examined, broadcast monitoring, transaction Tracking, audience measurement, triggering secondary activity (such as interactive with software program or hardware component) are transmitted and are believed about the auxiliary of content Breath (such as title text, full name and artist name or on how to buy the instruction of content) etc..Use above list is not Plan tool is exhaustive, because many other current and future systems can benefit from the mainly total channel transmitting with auxiliary information.
Design watermaking system need to reach the transparency (not sentience) of embedded watermark, the robustness of embedded watermark (that is, The intentionally and unintentionally ability of distorted signals is born in watermark) with the security requirement of system (that is, embedded watermark can escape detection, delete The degree removed and/or manipulated by unauthorized party) between appropriate balance.It has to carry out this balance play while limitation is less than usual For the processing behaviour for the specific grade that the actual software and/or hardware embodiments of water mark embedding device and/or watermark embedder are forced The average number and/or maximum number that work (that is, processing load) and memory use.
Invention content
This section is intended the summary provided to particular exemplary embodiment and is not intended to limit disclosed in present application The range of embodiment.
The one side of disclosed embodiment is related to a kind of method, it includes:Reception includes sync section and packet portion Watermarked frame, the watermarked frame are obtained from the content for being embedded with watermark;By the received sync section and one or more pre- mistakes True synchronization template is compared;And received watermarked frame described in an at least outcome evaluation based on the comparison.
In an example embodiments, generates one or more described predistortions at least partially through following operation and synchronize Template:Generate multiple navigation contents;The multiple navigation content is set to be embedded with the watermark including sync section;By one or more Distortion makes the multiple embedded navigation content distortion;And it obtains candidate predistortion from the multiple distortion navigation content and synchronizes mould Plate.In a kind of exemplary version, generates one or more described synchronization templates and be further contained in by emitting media hair The multiple embedded navigation content that a subgroup is received after penetrating, wherein one or more distortions are introduced into institute by the transmitting media In the multiple embedded navigation content for stating subgroup.In addition, one or more synchronization templates described in generating also include:It is connect described Each of the sync section of the multiple navigation content of receipts subgroup and the candidate predistortion synchronization template are compared, And the sync section matched one of the selection in predefined tolerance with the multiple navigation content of the received subgroup Or multiple candidate predistortion synchronization templates.
It is described relatively to generate each of one or more described predistortion synchronization templates in an example embodiments Error count, the error count indicates the received sync section of the watermarked frame and one or more described predistortions The number of mismatch symbol between each of synchronization template.It is described relatively to generate institute in another example embodiments The correlation of each of one or more predistortion synchronization templates is stated, the correlation indicates the synchronization of the watermarked frame Part to what extent matches each of one or more described predistortion synchronization templates.
According to another embodiment, method referred to above further includes:After the comparison, best match is identified The predistortion synchronization template of the received sync section of the watermarked frame, and selection mould synchronous with the identified predistortion One or more associated type of distortion of plate and amount distortion indicate the distortion being present in the content.Implement at one In example, method referred to above further comprises distortion and/or distortion combination for each type with order group of presorting Knit the candidate predistortion synchronization template.In this embodiment, the order of presorting makes with expression real content distortion The first candidate predistortion synchronization template ranking compared with high likelihood is higher than with the property of may be less likely to for indicating real content distortion Second candidate predistortion synchronization template.
In another embodiment, one or more described predistortion synchronization templates correspond to the specific search in distorted space Granularity.In a kind of version of above example, select the number of one or more predistortion synchronization templates to reduce One or both of the following terms:Computing resource needed for false watermark detection probability and/or assessment the received watermarked frame.
According to another embodiment, the assessment generates the existing instruction to one of the following terms:Tentative watermark, It indicates the candidate watermark for having more than the associated false watermark detection probability for wanting false watermark detection probability;Or conclusive water Print indicates there is the watermark for being less than or equal to the associated false watermark detection probability for wanting false watermark detection probability after testing. In another embodiment, the assessment identification is present in one or more type of distortion and amount distortion in the content.
In another embodiment, the content includes at least first and second watermark message, and first watermark message With the payload less than second watermark message.In this embodiment, assessing the received watermarked frame causes institute It states the first watermark message and is detected as tentative watermark, and carried using the content distortion estimation obtained for the tentative watermark Take second watermark message.
The another aspect of disclosed embodiment is related to a kind of device comprising receiver, the receiver are configured to connect Packet receiving includes the watermarked frame of sync section and packet portion, and the watermarked frame is obtained from the content for being embedded with watermark.Described device is also Including:Comparator is configured to the received sync section being compared with one or more predistortion synchronization templates;And Evaluator is configured to received watermarked frame described in an at least outcome evaluation for device based on the comparison.
Another embodiment is related to a kind of device, it includes:Water mark embedding device is configured so that multiple navigation contents are embedded in There is the watermark including sync section;Distortion processing component is configured to make the multiple insertion lead by one or more distortions Frequency content is distorted;And watermark embedder, it is configured to generate candidate predistortion synchronization mould from the multiple distortion navigation content Plate.In one embodiment, this device further comprises:Receiver is configured to by emitting being followed by for media transmission The multiple embedded navigation content of a subgroup is received, wherein one or more distortions are introduced into the subgroup by the transmitting media In the multiple embedded navigation content;And template matches component, it is configured to lead described the multiple of received subgroup Each of the sync section of frequency content and the candidate predistortion synchronization template are compared, and are selected in predefined tolerance It is interior same with one or more matched candidate predistortions of the sync section of the multiple navigation content of the received subgroup Walk template.
The another aspect of disclosed embodiment is related to a kind of device, it includes processor and memory, the memory packet Include processor executable code.The processor executable code configures described device when being executed by the processor to receive Watermarked frame including sync section and packet portion, the watermarked frame are obtained from the content for being embedded with watermark;It is received described Sync section is compared with one or more predistortion synchronization templates;And institute described in an at least outcome evaluation based on the comparison Receive watermarked frame.
The another aspect of disclosed embodiment is related to a kind of computer being embodied in non-transitory computer-readable media Program product comprising for receiving the program code of the watermarked frame for including sync section and packet portion, the watermarked frame from The content for being embedded with watermark obtains.The computer program product also include for by the received sync section with it is one or more Program code that a predistortion synchronization template is compared and for being connect described in an at least outcome evaluation based on the comparison Receive the program code of watermarked frame.
The another aspect of disclosed embodiment is related to a kind of method, and it includes multiple tentative from embedded content host extraction Watermark, wherein it is more than the associated false watermark detection probability for wanting false watermark detection probability that each tentative watermark, which indicates to have, Candidate watermark.The method also includes:Using in the extracted tentative watermark both at least obtain be present in it is described embedding Enter the associated estimated distortion information of one or more distortions in content host;And it based on the estimated distortion information, obtains Obtain one or more predistortion watermark templates.The method is further included using one or more described predistortion watermark templates again Assess at least one of described extracted tentative watermark.
In one embodiment, described reappraise causes to detect and be associated in the extracted tentative watermark The false watermark detection probability of each compares the watermark with improved false watermark detection probability.In another embodiment, described Reappraising leads to detect the associated false watermark detection probability with less than or equal to the wanted false watermark detection probability Conclusive watermark.In another embodiment, the expression of each of described predistortion watermark template can pollute described embedded main The specific type and specific quantity of the distortion of at least one type of machine content.According to another embodiment, described reappraise causes To being present in the improved estimation of the distortion in the embedded content host.
In one embodiment, method referred to above, which is further contained in, obtains one or more predistortion watermark templates Before, determine whether the estimated distortion information corresponds to over the amount distortion of certain distortion threshold value.In this embodiment, only The estimated distortion information correspond to no more than the certain distortion threshold value amount distortion in the case of obtain described one or Multiple predistortion watermark templates.
In another embodiment, using two or more synchronization portions of described at least two extracted tentative watermarks Separately win to obtain the estimated distortion information.In this embodiment, by by described in the extracted tentative watermark at least Spacing between the two is compared with the nominal spacing for being associated with the watermark for not being distorted content and obtains the estimated distortion Information.In another embodiment, the extraction of each of described tentative watermark includes detecting the tentative watermark The triggering tentative watermark packet portion extraction sync section.
The another aspect of disclosed embodiment is related to a kind of device, it includes extractor, the extractor be configured to from Embedded content host extracts multiple tentative watermarks, wherein it is more than to want false watermark detection general that each tentative watermark, which indicates to have, The candidate watermark of the associated false watermark detection probability of rate.This device includes also distortion estimator, and the distortion estimator is through matching Set with use in the extracted tentative watermark both at least obtain with one be present in the embedded content host or It is multiple to be distorted associated estimated distortion information and obtain one or more predistortion watermark templates.This device, which further includes, to be commented Estimate device, the evaluator is configured to reappraise using one or more described predistortion watermark templates described extracted tentative At least one of watermark.
The another aspect of disclosed embodiment is related to a kind of device comprising processor and memory, the memory packet Containing processor executable code.The processor executable code is configured when being executed by the processor states device with from insertion Content host extracts multiple tentative watermarks, wherein it is more than to want false watermark detection probability that each tentative watermark, which indicates to have, The candidate watermark of associated vacation watermark detection probability.The processor executable code is also configured when being executed by the processor Described device is to use at least the two in the extracted tentative watermark to obtain and be present in the embedded content host The associated estimated distortion information of one or more distortions;And based on the estimated distortion information, it is pre- to obtain one or more It is distorted watermark template.The processor executable code further configures described device when being executed by the processor to use One or more described predistortion watermark templates reappraise at least one of described extracted tentative watermark.
The another aspect of disclosed embodiment is related to a kind of computer being embodied in non-transitory computer-readable media Program product, it includes the program codes for extracting multiple tentative watermarks from embedded content host, wherein each tentative Watermark indicates the candidate watermark for having more than the associated false watermark detection probability for wanting false watermark detection probability.The computer Program product also includes described embedded main for being obtained and being present in using at least the two in the extracted tentative watermark One or more in machine content are distorted the program code of associated estimated distortion information, and are used for based on the estimated mistake The program code of one or more predistortion watermark templates of true information acquisition.The computer program product is further included for making The program generation of at least one of described extracted tentative watermark is reappraised with one or more described predistortion watermark templates Code.
The another aspect of disclosed embodiment is related to a kind of method, and it includes extract tentative water from embedded content host Print, wherein the tentative watermark indicates the time for having more than the associated false watermark detection probability for wanting false watermark detection probability Select watermark.The method also includes:Instruction is obtained using the extracted tentative watermark to be present in the embedded content host Certain distortion or distortion combination coarse value estimated distortion information;And selection is corresponding to one near the coarse value Or one or more supplement predistortion watermark templates of multiple distortion values.The method is further included using described selected one or more A supplement predistortion watermark template reappraises the extracted tentative watermark.
In one embodiment, obtaining the estimated distortion information includes:Correspond to specific mistake with coarse-grained selection Multiple rough predistortion watermark templates of the range of true or distortion combination distortion value;By the extracted tentative watermark and institute Each of multiple rough predistortion watermark templates are stated to be compared;And it is extracted tentative described in best match by identifying First rough predistortion watermark template of watermark and obtain the estimated distortion information.In a kind of version of this embodiment In, the multiple rough predistortion watermark template is randomly choosed in the larger set of predistortion watermark template.Implement herein In another version of example, selection corresponds to one or more types for being likely to be present in the distortion in the embedded content host The multiple rough predistortion watermark template.
According to another embodiment, one or more described supplement predistortion watermark templates of selection are searched for realizing with fine granulation Distorted space near the coarse value.In another embodiment, described reappraise causes to being present in the embedded master The improved estimation of distortion in machine content.In a kind of version, using the improved estimation come main from the insertion The additional watermark of machine contents extraction.In one embodiment, described reappraise leads to detect and be associated with the extracted examination The false watermark detection probability of the property tested watermark compares the watermark with improved false watermark detection probability.In another embodiment, institute Stating to reappraise causes to detect with less than or equal to the associated false watermark detection probability for wanting false watermark detection probability Conclusive watermark.
In another embodiment, it is described reappraise including:It will one or more described supplement predistortion watermark templates and institute Extracted tentative watermark is stated to be compared;Generation and each more associated error count, wherein the error count table Show that the corresponding supplement predistortion watermark template to what extent matches the extracted tentative watermark;And selection corresponds to The supplement predistortion watermark template of minimum produced error count.In another embodiment, with repetitive mode one time one One or more described supplement predistortion watermark templates are selected aly.
The another aspect of disclosed embodiment is related to a kind of device, it includes extractor, the extractor be configured to from Embedded content host extracts tentative watermark, wherein it is more than to want false watermark detection probability that the tentative watermark, which indicates to have, The candidate watermark of associated vacation watermark detection probability.This device further includes distortion estimator, and the distortion estimator is through matching It sets to use the extracted tentative watermark to obtain certain distortion or distortion that instruction is present in the embedded content host The estimated distortion information of the coarse value of combination, and select to correspond to one of one or more distortion values near the coarse value Or multiple supplement predistortion watermark templates.This device also comprises evaluator, and the evaluator is configured to using described selected It selects one or more supplement predistortion watermark templates and reappraises the extracted tentative watermark.
According to the another aspect of disclosed embodiment, a kind of device is provided, it includes processor and memory, the storage Device includes processor executable code.The processor executable code configured when being executed by the processor described device with Tentative watermark is extracted from embedded content host, wherein it is more than to want false watermark detection probability that the tentative watermark, which indicates to have, Associated false watermark detection probability candidate watermark.The processor executable code is also matched when being executed by the processor Described device is set to use the extracted tentative watermark to obtain the specific mistake that instruction is present in the embedded content host The estimated distortion information of true or distortion combination coarse value, and select to correspond to one or more mistakes near the coarse value One or more supplement predistortion watermark templates of true value.The processor executable code by the processor when being executed into one Step configuration described device is to use one or more described selected supplement predistortion watermark templates to reappraise the extracted examination The property tested watermark.
The another aspect of disclosed embodiment is related to a kind of computer being embodied in non-transitory computer-readable media Program product, it includes the program codes for extracting tentative watermark from embedded content host, wherein the tentative watermark Indicate the candidate watermark for having more than the associated false watermark detection probability for wanting false watermark detection probability.The computer program Product also includes specific in the embedded content host for being present in using the extracted tentative watermark acquisition instruction The program code of the estimated distortion information of the coarse value of distortion or distortion combination, and for selecting to correspond in the coarse value The program code of one or more supplement predistortion watermark templates of one or more neighbouring distortion values.The computer program product It further includes for reappraising the extracted experiment using one or more described selected supplement predistortion watermark templates The program code of property watermark.
The another aspect of disclosed embodiment is related to a kind of method, and it includes extract tentative water from embedded content host Print, wherein the tentative watermark indicates the time for having more than the associated false watermark detection probability for wanting false watermark detection probability Select watermark.The method further includes be positioned in the embedded content host relative to described extracted tentative by obtaining The symbol of potential watermarked frame at the predefined position of watermark and form one or more extrapolated watermarks, and determine with the warp Detect whether extrapolated watermark when tentative watermark is evaluated jointly meets wanted false watermark detection probability.In one embodiment In, the symbol location of the potential watermarked frame in the embedded content host relative to the extracted tentative water At the time predefined of print and/or spatial position.
In another embodiment, determine whether the extrapolated watermark meets wanted false watermark detection probability and include:It determines The number of mismark in one or more of described extrapolated watermark is based at least partially on the described through true of mismark The one or more of the fixed number mesh into the extrapolated watermark assigns weight, and determine with the watermark tentative after testing Whether the weighted extrapolated watermark meets the wanted false watermark detection probability when combination.In this embodiment, can pass through One or more of the following terms determines the number of the mismark in each extrapolated watermark:The extrapolated watermark symbol Comparison number with the symbol of the extracted tentative watermark executes the error-correcting code decoding of the extrapolated watermark symbol, And/or the comparison of the extrapolated watermark and one or more predistortion watermark templates.
In one embodiment, forming each of described extrapolated watermark includes:It obtains in one or more segmentations The number of mismark is based at least partially on the number of the mismark in each of one or more described segmentations Assign weight, combination associated described assigned with one or more described segmentations to each of one or more described segmentations Weight is to generate one or more weighted extrapolated watermark sections, and determination is combining when institute with the watermark tentative after testing State whether weighted extrapolated watermark section meets the wanted false watermark detection probability.In this embodiment, described one is obtained Or the number of the mismark in each of multiple segmentations includes:It will be in each of one or more described segmentations The symbol of the potential watermarked frame be compared with one or more predistortion watermark templates;And generate it is described one or more The counting of each of segmentation, it is described to count the symbol for indicating the potential watermarked frame in one or more described segmentations The number of mismatch symbol between one or more described predistortion watermark templates.In addition, in a kind of variation of this embodiment In form, the number of the segmentation in the extrapolated watermark is determined based on one or more of the following terms:The extracted examination The range of the property tested watermark, the amount distortion being present in the embedded content host and/or it is present in the embedded content host Type of distortion.In addition, in a kind of version of this embodiment, it is based at least partially in length and is equal to particular fragments Non-watermarked segmentation expection weight assignment described in particular fragments the weight.According to another embodiment, at least partly The range of each segmentation is determined based on one or more of the following terms:It is expected that being present in the distortion in the embedded content host Amount and the expected type of distortion being present in the embedded content host.In another embodiment, for jointly across than described One or more described segmentations of the small range of tentative watermark are executed about combining when institute with the watermark tentative after testing State the determination whether weighted extrapolated watermark section meets the wanted false watermark detection probability.
According to another embodiment, the false watermark detection probability corresponds to the detection of conclusive watermark.In another reality It applies in example, method referred to above further includes distortion or the distortion group reported to being present in the embedded content host The estimation of the amount and type of conjunction.
The another aspect of disclosed embodiment is related to a kind of device, it includes extractor, the extractor be configured to from Embedded content host extracts tentative watermark, wherein it is more than to want false watermark detection probability that the tentative watermark, which indicates to have, The candidate watermark of associated vacation watermark detection probability.Described device also includes:Watermark extrapolator is configured to be determined Potential watermarked frame in the embedded content host at the predefined position relative to the extracted tentative watermark Symbol and form one or more extrapolated watermarks;And evaluator, be configured to determine with the water tentative after testing Whether the extrapolated watermark meets wanted false watermark detection probability when printing common evaluation.
The another aspect of disclosed embodiment is related to a kind of device, it includes processor and memory, the memory packet Containing processor executable code.The processor executable code configures described device when being executed by the processor with from embedding Enter the tentative watermark of host contents extraction, wherein it is more than the phase for wanting false watermark detection probability that the tentative watermark, which indicates to have, The candidate watermark of the false watermark detection probability of association.The processor executable code also configures institute when being executed by the processor Device is stated to be positioned in the embedded content host relative to the predefined of the extracted tentative watermark by obtaining The symbol of potential watermarked frame at position and form one or more extrapolated watermarks, and determine with the water tentative after testing Whether the extrapolated watermark meets wanted false watermark detection probability when printing common evaluation.
The another aspect of disclosed embodiment is related to a kind of computer being embodied in non-transitory computer-readable media Program product, it includes the program codes for extracting tentative watermark from embedded content host, wherein the tentative watermark Indicate the candidate watermark for having more than the associated false watermark detection probability for wanting false watermark detection probability.The computer program Product is also comprised mean for obtaining and is positioned in the embedded content host relative to the extracted tentative watermark The symbol of potential watermarked frame at predefined position and the program code for forming one or more extrapolated watermarks, and exist for determining Whether the extrapolated watermark meets the journey of wanted false watermark detection probability when being evaluated jointly with the watermark tentative after testing Sequence code.
The another aspect of disclosed embodiment is related to a kind of method comprising:From the content for being embedded with one or more watermarks Potential watermarked frame is extracted, wherein each embedded watermark includes forming multiple symbols of watermarked frame;The watermarked frame is divided into more A segmentation, wherein each of the multiple segmentation includes the two in more watermark symbols;Weight is assigned to each segmentation; The combination assigned weight associated with two or more segmentations is weighted partially or completely to generate one or more Watermarked frame;And determine whether one or more described weighted complete or partial watermarked frames meet wanted false watermark detection probability.
In one embodiment, the range of each segmentation is selected according to the type for the mistake being present in the content. In another embodiment, it is based at least partially on the expection weight assignment institute of the non-watermarked segmentation in length equal to particular fragments State the weight of particular fragments.
The another aspect of disclosed embodiment is related to a kind of device comprising extractor, the extractor be configured to from It is embedded with the potential watermarked frame of contents extraction of one or more watermarks, wherein each embedded watermark includes forming multiple symbols of watermarked frame Number.Described device also includes evaluator, and the evaluator is configured to the watermarked frame being divided into multiple segmentations, wherein described Each of multiple segmentations include the two in more watermark symbols;Weight is assigned to each segmentation;Combination and two or two A above associated assigned weight of segmentation is to generate one or more weighted partially or completely watermarked frames;And determine institute State whether one or more weighted complete or partial watermarked frames meet wanted false watermark detection probability.
The another aspect of disclosed embodiment is related to a kind of device, it includes processor and memory, the memory packet Containing processor executable code.The processor executable code configures described device when being executed by the processor with from embedding Enter to have the potential watermarked frame of the contents extraction of one or more watermarks, wherein each embedded watermark includes forming multiple symbols of watermarked frame Number;The watermarked frame is divided into multiple segmentations, wherein each of the multiple segmentation includes in more watermark symbols The two;Weight is assigned to each segmentation;The combination assigned weight associated with two or more segmentations is to generate One or more weighted partially or completely watermarked frames;And determine whether one or more described weighted complete or partial watermarked frames are full Foot wants false watermark detection probability.
The another aspect of disclosed embodiment is related to a kind of computer being embodied in non-transitory computer-readable media Program product, it includes:For the program code from the potential watermarked frame of contents extraction for being embedded with one or more watermarks, wherein often One insertion watermark includes forming multiple symbols of watermarked frame;Program code for the watermarked frame to be divided into multiple segmentations, Each of wherein the multiple segmentation includes the two in more watermark symbols;Journey for assigning from weight to each segmentation Sequence code;It is weighted to generate one or more for combining the assigned weight associated with two or more segmentations The partially or completely program code of watermarked frame;And for determining whether one or more described weighted complete or partial watermarked frames are full Foot wants the program code of false watermark detection probability.
Description of the drawings
Fig. 1 is the block diagram for the watermaking system for being suitable for disclosed embodiment.
Fig. 2 is the block diagram for the watermark embedder device for being suitable for disclosed embodiment.
Fig. 3 A displayings have the exemplary watermarked frame of synchronous (SYNCH) and the parts PACKET.
Fig. 3 B are illustrated in the success of the parts SYNCH of watermarked frame and the exemplary PACKET after failed compilation converges It compiles and attempts.
Fig. 3 C illustrate the PACKET compilation operations using predistortion SYNCH templates according to one exemplary embodiment.
The predistortion SYNCH templates of Fig. 4 displayings according to one exemplary embodiment.
Fig. 5 illustrates the one group of operation executed according to one exemplary embodiment.
Fig. 6 is the specific group of some or all of operations in the operation that can be used for executing Fig. 5 according to one exemplary embodiment The block diagram of part.
Fig. 7 illustrate according to one exemplary embodiment can be executed with generate one group of predistortion watermark template one group of behaviour Make.
Fig. 8 is the block diagram of the specific components of some or all of operations in the operation for can be used for executing Fig. 7.
Fig. 9 illustrates the one group of operation that can be executed the extraction to promote embedded watermark according to one exemplary embodiment.
Figure 10 illustrates can be executed to be embedded in one group of watermark from distortion contents extraction according to one exemplary embodiment Operation.
Figure 11 A displayings have the exemplary watermarked frame of synchronous (SYNCH) and the parts PACKET.
The success and the exemplary PACKET after failed compilation that Figure 11 B are illustrated in the parts SYNCH of watermarked frame Compilation is attempted.
Figure 11 C illustrate the PACKET compilation operations after detecting tentative watermark according to one exemplary embodiment.
Figure 11 D illustrate being segmented after detecting tentative watermark and using watermark according to one exemplary embodiment PACKET compilation operations.
Figure 12 illustrate according to one exemplary embodiment by separate watermark search with sparse granular search and fine granulation Exemplary plot of the false watermark detection probability that search is compared to watermark weight threshold.
Figure 13 illustrates can be executed to extrapolate one group of watermark on the basis of by segmentation according to one exemplary embodiment Operation 1300.
Figure 14 is some or all of behaviour in the operation that can be used for executing Figure 13 and/or Figure 18 according to one exemplary embodiment The block diagram of the specific components of work.
The curve graph of the expection weight of the non-watermarked segmentation of Figure 15 displayings according to one exemplary embodiment.
Figure 16 illustrates the simplification figure for the device that can implement various disclosed embodiments in it.
Figure 17 illustrates SYNCH compilations and predistortion SYNCH template operations according to one exemplary embodiment.
Figure 18 illustrates the one group of operation that can be executed with watermark of extrapolating according to one exemplary embodiment.
Specific implementation mode
In the following description, following detailed description, state details and explanation in order to provide to disclosed reality Apply the thorough understanding of example.However, it will be apparent to those skilled in the art that, it can be in other implementations away from these details and explanation The present invention is put into practice in example.
In addition, in this description, meaning to serve as example, example or diagram illustrating using word " demonstration ". Any embodiment or design here depicted as " demonstration " are not necessarily to be construed as preferably or more advantageous than other embodiments or design. But, it is intended to concept is presented in specific ways using word exemplary.
It can operate with various watermark embedding techniques by following and embed watermark data into content host:For example, exist In time domain or frequency domain manipulate host signal least significant bit, using spread-spectrum, phase, amplitude or frequency modulating technology by Separate carrier signals are inserted into watermark, and are inserted into water using the interdependent carrier signal of host (such as feature modulation and informed embedded technology) Print.Most embedded technologies using content host psycho-visual or psychologic acoustics (or both) analysis is inserted into watermark to determine Optimal location and amplitude.This analyzes the degree that the generally recognized host signal can be hidden or shelter the insertion watermark perceived such as people.
Emit usually using various storages and/or the embedded content host of launch channel storage and/or by embedded content host To another location.These channels by intrinsic noise and distortion characterize, such as due to pollution optical media on data cut and Mistake caused by fingerprint, the noise in the radio broadcasting of audio-visual content, via internet or from the more of media server Packet discarding in the flowing of media content etc..The additional damage that can influence the fidelity of embedded watermark may be due to usually to more The various signal processing operations (such as lossy compression, scaling, rotation, analog/digital conversion etc.) that media content executes cause.More In number digital watermarking application, embedded watermark allows for maintaining its integrality under this noise like and distortion condition.
The safety of embedded watermark is the another aspect of watermaking system.In specific application, (such as proof of ownership, source are tested Card, tracing pirate, the access control to copyrighted content) in, embedded watermark, which must resist, to be intended to the presence of detection watermark, translates Solution is by the data of those watermark carryings, modification or is inserted into illegal value (forgery) and/or removes the intentional manipulation of embedded watermark.
It is watermark payload capacity to design the another consideration in watermaking system.This is required depending on the specific of watermaking system Using.Typical case is between from needing to detect the presence (that is, it needs to single state watermark) of only watermark to tens per second of needs In the range of auxiliary information.In latter, embedded position can be used to come carrying identification and timing information, for example, sequence number and Timestamp, metadata (metadata), such as title, artist name, purchase information etc..
Another factor in design actual watermark system is embedded and/or extraction unit calculating cost.This factor is to must The consumer electronics implemented or software must be required to utilize by limited silicon area or calculating becomes more and more important.This factor It can be closely related with the given application of watermaking system.For example, the watermark for being used for court's tracking of pirate channel (such as will not Watermark those of is embedded in each copy of content spread via internet with code) it needs to be simply embedded into device and tolerable is multiple Miscellaneous and high-cost court extractor.On the other hand, for example, be designed to prevent more matchmakers in consumer electronics The copy control system tolerable exquisiteness embedded device but the simple and highly efficient extractor of needs of the access of the unauthorized held in vivo.
The another key factor designed in watermaking system is false watermark detection probability.False watermark can be from unlabelled content It generates, or may cause due to detecting the watermark value for the watermark value for being different from initially being embedded in when detecting watermark.Want false Watermark detection grade may also depend upon the set application of watermaking system and change.For example, in copy control application, vacation detection Probability must be very low (for example, about 10-12), because executing limitation row due to the false watermark detection of the content to legal purchase Dynamic (for example, stopping the playback of content) certainly will make user dejected and have passive shadow to device manufacturing person and/or content provider It rings.On the other hand, the number that the following song has been broadcasted is tracked for (for example) to generate the broadcast of royalty or pop roll Supervision application, the relatively high false verification and measurement ratio of tolerable is (for example, about 10-6), because the presence of several false detections can be to counting most Result has little effect on afterwards.
Another key factor for influencing the overall performance of watermaking system is the particular technology for watermark insertion and extraction Selection.In view of specific application on hand, it is non-appointing often with challenge that optimal compromise is made between requirement referred to above Business.
Disclosed embodiment significantly improves the insertion and extraction of watermark, while balancing various system requirements, including watermark is saturating Lightness, robustness, false positive detection, safety, payload capacity and processing load.In some embodiments, watermark extracting Based on tentative watermark detection as the intermediate steps towards conclusive watermark extracting.
Following conversion can be used to promote the understanding with the relevant concept of disclosed embodiment.However, it should be understood that can be used Other labels and the watermaking system for indicating the embodiment to indicate to be suitable for present application.Watermaking system can by tuple O, W, K, EK, DK, CTDescription, wherein O is one group of whole origin host content (that is, in one or more hosts without embedded watermark Hold), W is one group of whole watermark, and K is one group of whole stego-key, EKFor embedded operation, DKFor extraction operation and CTTo compare fortune It calculates.Embedded operation EKAnd extraction operation DKIt can be indicated respectively by equation (1) and (2).
EK:O×W×K→Ow (1)。
DK:Ow×K→W′ (2)。
In equation (1) and (2), OwIt is from described group of insertion content O for described group of insertion content and W 'wThe institute of extraction State a group candidate watermark.The comparison operation C indicated by equation (3)TExtracted watermark W ' and described group of whole watermark W are compared Compared with.
CT:<W ', W>→ { 0,1 } (3).
It should be noted that in some embodiments, whole watermarks can not be directed to but execute institute for a subgroup of whole watermarks It states and compares.For example, this subgroup may include thering is the watermark of specific range of values, the watermark for being embedded in certain types of content Deng.After the successful match between obtaining W ' and W, the comparison operation generates the first value (for example, " 1 ") at once, and not at After work(matching, comparison operation generates second value (for example, " 0 ") at once.
The simplified block diagram of the watermaking system 100 of Fig. 1 displayings according to one exemplary embodiment.Origin host content 102, coAnd water It is the input to water mark embedding device 104 to print 110W.Watermark 110 is by using embedded stego-key 106, K and origin host content 102 Watermarking arrangements module 108 generate.Produced watermark 110 is embedded into content host 102 to generate embedded content host 112, cw.Pass through embedded operation EKThe generation of insertion content host 112 can be indicated by following equation (4).
cW=Ek(co, W) and (4).
Embedded content host 112 emits/stores the storage of media 114 and/or transmitting using one or more.Transmitting/storage matchmaker Body 114 can be one-way or bi-directional transmitting media.In the embodiment using two-way launch channel, the information from watermark embedder The reflowable embedded components to watermaking system 100.This feeds back the hair that may include, but are not limited to identification, verification and/or authorization message It penetrates, the instruction of the success or failure about watermark extracting operation operates the report etc. of relevant various statistics with extractor.
Referring back to Fig. 1, by transmitting ,/content that storage media 114 emit may include due to inherently emitting/stores media 114 cause and/or the distortion of result for the intentional attack to embedded content host 112.This modified embedded content host 116, c 'wFor to the input of watermark embedder 118, for watermark embedder 118 using extraction stego-key 120, K and (possibly) are former Beginning content host 102 generates one or more candidate watermarks 122, W '.By extracting operation DKThe production of the candidate watermark 122 of execution Life can be indicated by following equation (5).
W '=DK(c′w, co) (5)。
Note that many watermark detectors do not need origin host content 102 to extract embedded watermark, and therefore, at those In situation (commonly referred to as blind Detecting), in equation (5), operation D is extractedKTo the dependence of origin host content 102 can under Drop.It is further noted that in some embodiments, embedded stego-key 106 is identical as extraction stego-key 120.However, at it In its embodiment, embedded stego-key 106 is different from extraction stego-key 120.
In general candidate watermark 122 is different from needle due to possible content manipulation or due to imperfect embedded program step Watermark 110 to embedded selection.By comparator 124 to candidate watermark 122 and one or more possible watermarks 126, WiIt is compared. The comparator generates the matched watermark for indicating whether to generate between one of candidate watermark 122 and possible watermark 126 and examines Survey device output 128.For example, watermark detector output 128 can be generated according to equation (3).Watermark detector output 128 can Further include the instruction of the value about watermark after testing, state and/or pattern.It should be noted that the comparator 124 of Fig. 1 only illustrates Illustrate for evaluating the candidate watermark W ' whether really upper exemplary mechanisms for indicating the true watermark in content.For evaluating watermark In the presence of and/or value other exemplary techniques including but not limited to using error detection and/or error correction code.For example, can incite somebody to action Candidate watermark W ' decodings through error-correcting code (ECC) coding are to determine whether to restore faultless watermark packet and/or acquisition Pollute the number of the mistake of specific watermark packet.
In view of wanted false watermark extracting probability PfGenerate watermark detector output 128.False watermark detection can two kinds of differences Mode occurs.First, for any watermark extracting system, be present in non-watermarked content mistakenly detect the small of watermark but Limited probability (being also known as false positive detection sometimes).For example, Secure Digital Music Initiative proposal (SDMI) and DVD audio requests Regulation is less than 10-12The false positive watermark detection probability of/15 seconds assay intervals.This is it is meant that flat between false positive watermark detection The equal time is necessary for continuously monitoring 4,760,000 years non-watermarked content.The false detection of Second Type is checking the content for having watermark And occur when detecting the watermark value different from initially embedded watermark value.The false detection (commonly referred to as error detection) of this type can Generate undesirable result.For example, error detection, which can potentially result in, detects " not allowing to play back " watermark rather than " does not allow Copy " watermark, and therefore, the playback of the content of legal purchase is caused to stop.For the watermaking system appropriately designed, false detection rate The order of magnitude identical with false positive detection rate as described above should be about.
In some systems, the output of the comparison operation indicated by equation (3) is determined using threshold value T.That is, comparator Output can be indicated by following equation (6).
In equation (6), m is comparison result (and/or correlation) so that as m increases false watermark detection probability PfIt is single Ground is adjusted to reduce.
Comparator operation and the calculating of false watermark detection probability depend on selected watermarking algorithm.For example, many bases Use the calculation of correlation between W ' and W as comparison measuring m in the watermarking algorithm of spread spectrum.In particular, estimate candidate water Related coefficient m between print W ' and the pseudorandom pattern W used in embedded watermark.Next, if estimated related coefficient m More than specific threshold T, then reporting successfully watermark extracting.In the situation of unmarked content, extracted false watermark style with The related coefficient of operation roughlys abide by normal distribution between long pseudorandom pattern, this means that well-known error letter can be used Number operation vacation watermark detection probability Pf.As related coefficient m increases, false watermark detection probability PfMonotonously reduce.Therefore, threshold value T With PfWith one-to-one mapping.
Alternatively, can also by candidate watermark extracting be bit string, and then can be used error detection or with potential watermark Position pattern matching direct pattern operation bit-errors number e.Then, bi-distribution operation vacation watermark detection probability can be used Pf.For example, if watermark is less than or equal to e for the number of N bit lengths and bit-errors, equation (7) can be used to calculate False detection probability.
If watermark is formed by N=64 and detector only finds e=5 bit-errors, false watermark detection probability PfIt is small In 10-12.This PfCondition is typically enough to carry out conclusive watermark extracting and (for example) copyright implementation completely.According to equation (7) the false watermark detection probability P f obtained is as the number m (that is, N-e) of matched position increases and monotonously reduces.
Comparison operation as described above only generates two results.In the first result, extracts and report watermark (for example) To implement copyright rule.This result sometimes referred to as detects strong watermark.In the second result, watermark is not found and is not started other Action.In addition to previously mentioned conclusive watermark detection and no-watermark detect, the specified inspection of comparison program step can be also established Measure the third result of " tentative " watermark.For example, third result may specify that wherein comparing generation is directed to strong watermark detection Value more than or equal to threshold value T but less than another threshold value t is (for example, have the extraction situation of the number e) of vicious position.Compare fortune Three outputs calculated can be indicated by following equation (8).
Consider that wherein watermark is made of bit string and comparator output counts the situation being made of the number of bit-errors again. In above example, up to 5 mistakes are found in 64 bit length strings can be sufficient for conclusive watermark extracting.However, if detection Device finds 20 bit-errors, then false watermark detection probability is less than 0.2%, this makes watermark exist may but to be not enough to determine and prove it Use outside extractor.Therefore, any error count more than 5 (that is, T=6) but less than 21 (that is, t=21) can be used By tentative watermark detection sender.If error count is greater than or equal to 21 mistakes, false watermark detection probability is more than 0.2%, and therefore, watermark can be ignored.
Fig. 2 displayings are suitable for the simplified block diagram of the watermark embedder device 200 of disclosed embodiment.Watermark embedder device 200 can be self-contained unit or may be incorporated into as larger content spaces disposal plant (such as content playback apparatus, content relay device, content Recording device, set-top box etc.) component.It is received at receiver 204 and is passed to modified embedded content 202.It will be received in Fig. 2 Device 204 is portrayed as the independent assembly in watermark embedder device 200.However, it should be understood that receiver 204 can be at larger media It sets the component in the different sub-systems of device or may be incorporated into as a part for another component in watermark embedder device 200.By It can be in various formats in modified embedded content 202 and may include several audios, video, multimedia or data-signal, therefore connect Modified embedded content 202 is suitably adjusted to be recognized by other components of watermark embedder device 200 proper by receipts device 204 When form can be necessary.The adjusting may include signal processing operations, such as demodulation, decompression, release of an interleave, decryption, solution Disturb, resample, A/D conversion, reformat, filtering etc..
Stego-key selection component 208 is then from the stego-key for being used to extract embedded watermark by watermark extracting engine 206 At least one stego-key of Resource selection.In some embodiments, stego-key is stored in stego-key storage assembly 210 In.Watermark extracting result 216 is generated by watermark extracting engine 206.Watermark extracting result 216 may indicate that the presence of recovered watermark And/or the instruction of value and the reliability to recovered watermark and other information.It can be with predetermined time interval (for example, to specific User or device) report watermark extracting result 216.In some embodiments, distortion estimation component 212 is generated to may be present in The estimation of the type and amount of one or more distortions in reception content.Estimated distortion information can be there are content distortion the case where Under be used to promote the detection of embedded watermark by watermark extracting engine 206.Estimated distortion information can also be transmitted to assessment device assembly 214, assessment device assembly 214 is promoted the detection of embedded watermark by assessing by the watermarked frame that watermark extracting engine 206 is handled.One In a little embodiments, assessment device assembly 214 can perform the operation of such as the following terms:Refer to extracted potential watermark or watermark segmentation Send weight;Combine assigned weight;It assesses extracted watermark or whether to meet wanted false watermark detection general through accumulating watermark segmentation Rate etc..In some embodiments, watermark extracting result 216 can be defeated by assessment device assembly 214 rather than watermark extracting engine 206 Go out.Distortion estimation component 212, assessment device assembly 214 and watermark extracting engine 206 can with contain predistortion watermark template and other The storage device 218 (for example, database) of information communicates.Predistortion watermark template will be discussed in detail in following sections.Storage Device 218 can be the physical memory cell identical or different with stego-key storage assembly 210.It should be noted that promote to basis The understanding of concept, Fig. 2 illustrate the independent assembly in watermark embedder device 200.However, it should be understood that in some embodiment party It, can be by the two in described component or both combination of the above together in case.For example, in some embodiments, may be used Distortion estimation component 212, assessment one or more of device assembly 214 and storage device 218 are incorporated as watermark extracting engine 206 A part.
It in some applications, can be if the instruction of watermark extracting result 216 detects at least one conclusive watermark The 200 other coercion actions of outside execution of watermark embedder device (such as stop content playback, stop content record, display alarm Message etc.).If the instruction of watermark extracting result 216 detects at least one tentative watermark, extracted tentative watermark Use can be limited to the various adjustment operated to detector with (for example) starting in the watermark embedder device 200.Such as compared with Mentioned by morning, can be based on the tentative watermark of threshold test, the threshold value depend on tentative watermark use and handle load with Being traded off between robustness gain.
Many intentional attacks to digital watermarking or even regular content processing operation cause to change watermark location, size, The watermark distortion of orientation and other parameters.For example, picture rotation can be led to, in time domain by recording the film being shown on screen Or cutting, picture stretching, angle modification etc. in spatial domain.Similarly, audio frequency watermark can be subjected to time shift (for example, due to sound Frequency cut or concatenated with other audios cause), time-scaling, pitch-shift, tremble and tremble.Can by watermark extracting it Preceding detection content is distorted and makes content distortion reverse phase and compensates most distortions in the distortion.Alternatively, in some embodiments, It can be by adjusting watermark search program step so that extracted candidate's watermark and predistortion watermark template are related and complete or partial Alleviate the influence of such distortion in ground.
Distortion detection and compensation can be that manually or automatically, and it can be with or without the original contents at detector In the case of realize.Clearly, most desirable method is to provide automatic distortion detection without the use of original contents to simplify water Print detection program step.In general, this can be realized by introducing synchronous (or registration) watermark.
The exemplary watermarked frame of length L of Fig. 3 A displayings comprising sync section (SYNCH) and packet portion (PACKET).Scheming In the exemplary pattern of 3A, to put it more simply, describing a dimensional view of watermarked frame (for example, corresponding to audio content).However, should manage Solution, similar principles are applicable to the watermark with two or more dimensions (such as in being embedded in image, video sequence etc. Watermark).The synchronization of watermarked frame and packet portion can include respectively multiple symbols (that is, binary system or non-binary symbols).One In a little embodiments, the sync section of watermarked frame can be the special style or sequence being embedded in content host.In this way, watermarked frame Sync section is sometimes referred to as synchronization watermarking, synchronous pattern, sync mark, synchronizing sequence etc..One in the function of sync section Person is the watermarked frame helped in positioning host content.For example, watermark embedder can search for content (for example, process content Sample) to find the known synchronous pattern of the beginning of label watermarked frame.After successfully being detected sync section, watermark embedder can Then it attempts to restore the watermark packet symbol after sync section at once.In some embodiments, the detection of synchronous pattern is with thick For slightly granularity by the beginning sender of watermarked frame, this can further be triggered carries out extra process to increase watermark detection with fine granulation Reliability.In some systems, watermarked frame can contain be useful for (for example) with different grain size grade establish watermarked frame position and/ Or by two or more sync sections of the beginning of watermarked frame, end and/or other section senders.
In exemplary extraction operation workflow, after the successful compilation of SYNCH and detection, collect PACKET.So And when there is the distortion of significant quantity in the content, detection SYNCH can be difficult or impossible to.Fig. 3 B shows are in successfully detection mark Collect PACKET#1 after the parts SYNCH of the beginning of note PACKET#1.However, every in PACKET#2 and #3 due to leading over The distortions of the parts SYNCH of one and the PACKET#2 and #3 that do not collect.The extraction of watermark for further illustration considers wherein Audio content is embedded with watermark and is then linearly compressed (example in time due to intentionally or accidentally content processing operation Such as, moved up by associated tone) application.Depending on specific watermark embedded technology, the parts SYNCH through embedded watermarked frame can The time-scaling of specific quantity can be tolerated before its detection failure.Some situations of linear session scaling are suffered from content In, if can estimate the amount of time-scaling, can by attempt extract SYNCH patterns before in the opposite direction to content It zooms in and out and improves the immunity to time-scaling.By this method, make the reducing compressed reverse phase of audio time (that is, by compensating) and Watermark detection becomes to damage for large range of compression feasible.
In another embodiment, content of the alternative modified through time-scaling (or damaging in other ways), generates one or more It a predistortion synchronization template (for example, compressing synchronization template through the time) and uses it for examining in the case where not changing content itself It surveys through embedded synchronous pattern.As mentioned earlier, the position of watermarked frame is established using SYNCH patterns.SYNCH templates are through shape At the predefined SYNCH patterns of the detection to promote the SYNCH patterns being embedded in content.According to some embodiments, SYNCH inspections Survey program step include processing received content with obtain candidate SYNCH patterns and then by candidate SYNCH patterns with may include One or more SYNCH templates of multiple predistortion SYNCH templates are compared.Analysis and empirical result instruction generate one group and lose in advance True SYNCH templates provide and zoom in and out the watermark detection reliability as much but under relatively low processing cost to content.
In order to promote the understanding to disclosed embodiment, consider that wherein SYNCH patterns include embedding using specific embedded mobile GIS The example for entering 50 sequences in the sequence section of audio content is beneficial.It is further assumed that SYNCH patterns is each Position was across 1 second of host audio content.For the audio content with per second 44,100 samples, SYNCH patterns each It is embedded on 44,100 samples of content.It detects a kind of method of the SYNCH patterns from received content and collects institute for (1) The 44 of reception content, 100 samples, (2) handle the sample to extract candidate place value, and (3) repeat step (1) and (2) 49 times To form 50 candidate's SYNCH patterns, and candidate SYNCH patterns and one or more SYNCH templates are compared to determine by (4) Whether candidate SYNCH patterns correspond to the true SYNCH patterns with particular trusted grade really.
Due to being unaware of position of the SYNCH patterns in content, can need to repeat step (1) in a manner of sliding window To (4), wherein step (1) to (4) it is each repeatedly in, the treated sample of received audio content with previously weighed repeatedly It is folded.In egregious cases, repeats step (1) and arrive (4) 44,100 times there are one the 44,100 of sample searches granularity to generate tool The pond of a candidate's SYNCH patterns.However, in most practical applications, this radical approach is computationally infeasible, also has to detection There are the insertion SYNCH patterns of rational reliability unnecessary.Therefore, step is repeated generally directed to each watermark bit duration (1) (4) are arrived several times., sometimes referred to as with X position granular search's content, wherein X indicates to repeat to walk for each bit duration for this Suddenly (1) to (4) or at least number of step (1) and (2).In some embodiments, detection program step can rough sub- position grain It spends (for example, 3 sub- positions) to start, and repeats or restart with higher sub- position granularity once detecting potential SYNCH patterns Search.
In the case where being distorted there is no content, the candidate SYNCH samples being spaced apart each other with nominal range that collect can be passed through Formula place value executes SYNCH detection process referred to above.Figure 17 is the SYNCH compilations that can be executed according to one exemplary embodiment And/or the simplification figure that template generates.As mentioned earlier, sub- position pond indicates the candidate place value generated with sub- position granularity.Figure 17's Nominal stencil-chosen operation in exemplary pattern (or more generally, separates the son of d0 comprising every one the 5th sub- position of selection Position).In the above example, wherein SYNCH patterns are 50 bit sequences, select 50 such sub- positions to form candidate SYNCH patterns. Then candidate SYNCH patterns it is compared to determine with nominal (or not being distorted) SYNCH templates to what extent to match (for example, detecting that how many mismatch position).
It, can be by be selected different from the spacing of nominal spacing in the case where there is distortion (such as time-scaling distortion) Sub- position and form candidate SYNCH patterns.With reference to figure 17, the distortion (for example, the time extends) of the first kind can be directed to distance d1 And sub- position is selected with distance d2 for the distortion of Second Type (for example, the time shrinks).In some situations, different sons will be based on The candidate SYNCH patterns that column pitch obtains are compared with nominal SYNCH templates to what extent to be matched with evaluating it.
In some embodiments, it substitutes and candidate SYNCH patterns is matched with nominal SYNCH templates, by candidate SYNCH Pattern is compared with one or more predistortions SYNCH templates that may differ from nominal SYNCH templates.It can be obtained by following operation Obtain such predistortion SYNCH templates:So that a content (or various contents) is embedded with SYNCH patterns, make content by various distortions, And with nominal and/or modified sub- column pitch from distortion contents extraction SYNCH patterns.For example, with reference to figure 17, can by with The N number of sub- position of d1 spacing selection obtains the predistortion template #1 of length N (for example, N=50), and can be N number of by being selected with d2 spacing Sub- position obtains the predistortion template #2 of length N.Most had to scaling type distortion based on different sub- column pitch selection predistortion templates Effect.It, can be by with nominal spacing d0 for some distortions (for example, acoustic propagation, intensity/amplitude modulation, Video Camera capture etc.) It selects sub- position and obtains predistortion template.
In general, many dimensions of predistortion SYNCH template development distorted spaces can be used.Fig. 4 displayings wherein make original (or nominal) the SYNCH templates 402 (that is, SYNCH templates in the case where being distorted there is no content) that begin pass through various potential mistakes True A to K404,406,408,410 are to generate the example of one group of predistortion SYNCH templates A to K414,416,418,420.Fig. 4 is also What description can together be stored with predistortion SYNCH templates A to K414,416,418,420 is not distorted SYNCH templates 412.Template It (includes linear or non-thread that predistortion, which is applicable to modification in one or more dimensions in frequency domain/time domain/spatial domain/amplitude domain, Property scaling (distortion) and rotation) content.The non-exhaustive list that can influence the distortion for the watermark being inserted into image includes figure Image rotation turn, stretching, the dynamic range compression of illumination intensity signal, color balance etc. in horizontal or vertical dimension.It can influence to be inserted into The non-exhaustive list of the damage of watermark in audio content includes the time-scaling that linear session scales, tone is constant, time It constant tone scaling, dynamic range compression, equilibrium and resamples.
It should be noted that being easily extended to include watermark packet about the discussed above of SYNCH patterns.In addition, disclosed original Reason may extend into comprising in two or more dimensions for being embedded in spatial domain, time domain and/or frequency domain SYNCH or PACKET.Such SYNCH or PACKET can be indicated by binary system or non-binary symbols, and its detection can be based on binary system or non- Binary character and/or parameter.For example, generally can be described as the parts SYNCH of embedded watermark that relative program can be used The predefined signal pattern of step extraction.
Fig. 3 C are illustrated to collect with the similar PACKET of the identical packet of packet shown in Fig. 3 B and be operated, but in Fig. 3 C The successful detection of embedded SYNCH is realized in operation using predistortion SYNCH templates in the case where being distorted there are content.Treating capacity And false watermark detection probability depends on the number K of the predistortion template for detecting embedded synchronous pattern.The number of predistortion template The range and granularity of the distortion that mesh K is adapted to depending on needs and the digital watermark sensibility to certain distortion.For example, base Generally time-scaling distortion is compared in the digital watermark of spread-spectrum more sensitive based on the technology for replicating modulation.Therefore, when with When duplication modulation technique is compared, the technology based on spread-spectrum needs more predistortion templates to be distorted to be scaled in existence time In the case of watermark is effectively detected.
Constant tone scaling (TIPS) modification makes the situation that audio frequency watermark is distorted between considering when used.It is further false If predistortion watermark template is only counted and following TIPS modified values:3%, 6% and 9%.In this case, watermark embedder can only may be used By ground detection come the watermark of the content by about 3%, 6% or 9%TIPS damages (plus-minus tolerance value) distortion self and by its It is reported as tentative or conclusive.In this exemplary situation, when audio frequency watermark with any other TIPS ratios (for example, 4.5%) when being distorted, there is a possibility that can't detect conclusive watermark.Clearly, the selection of the number of predistortion template is notable Wanted reliability depending on SYNCH detections.Increase with the granularity of predistortion template, detects reliable SYNCH (for example, tool Have low level error count or high correlation coefficient value) chance also increase, but handle load also increase.Therefore it provides predistortion is same It is important to walk the compromise between the number of template and false watermark detection probability.
In some embodiments, granularity (and therefore, the predistortion template of the predistortion synchronization template within the scope of certain distortion Number) be selected so that and detect at least single test watermark in being distorted content.For example, selection is pre- in such manner It is distorted the number of synchronization template and spacing makes even if distortion between two predistortion templates centres (as in the above example), still In the presence of the good opportunity for detecting that SYNCH patterns subsequently then detect tentative watermark.
Once finding tentative watermark, extractor can start the more search meticulously of distorted space.Fig. 5 illustrates basis One group of operation 500 that example embodiments execute.At 502, watermarked frame is received.Institute's receiving frame may include synchronous (SYNCH) and Watermark packet (PACKET).At 504, received SYNCH is compared with multiple predistortion SYNCH templates.At 506, really It is fixed whether successfully to be detected SYNCH, and if so (that is, being "Yes" at 506), described group of operation 500 is at 508 Continue the PACKET that collects.On the other hand, if the determination at 506 does not indicate successfully SYNCH detections (that is, being "No" at 506), So described group of operation 500 continues at 520, wherein abandoning PACKET.
Referring back to Fig. 5, at 508, PACKET compilations may include various operations, such as release of an interleave, descrambling and other packets Formation operation.At 510, the number of the mistake in compiled PACKET is determined.For example, the operation at 510 may include making It is decoded with error correction/detection code, template matches etc..At 512, the number of the mistake in compiled PACKET is determined Whether with strong (that is, conclusive) detection of watermark associated first threshold is less than, and if so (that is, being at 512 "Yes"), then declaration detects conclusive watermark at 514.If determining error value of the instruction more than first threshold at 512 (that is, being "No" at 512), then described group of operation 500 continues at 516, wherein determining the mistake in compiled PACKET Number whether be less than second threshold associated with the detection of tentative watermark.If being determined as "Yes", institute at 516 It states a group operation 500 at 518 to continue, wherein declaration detects tentative watermark.On the other hand, if be designated as at 516 "No" then described group of operation 500 continues at 520, and abandons PACKET.
Fig. 6 is to illustrate the component 600 that can be used for executing some or all of operations in the operation described in Fig. 5 Simplification figure.Watermark frame grabber 602 is configured to receive the watermarked frame of the parts SYNCH and PACKET comprising watermarked frame.Compare Device 604 (a) is configured to receive SYNCH and is not distorted with predistortion synchronization template and it one or more in SYNCH templates Person is compared.The result of the comparison can be by distortion estimator 604 (b) for obtaining to being present in one or more in content The estimation of distortion.For example, distortion estimator is recognizable generates mould synchronous with the predistortion of the best match of received SYNCH Plate, and one or more type of distortion associated with identified predistortion SYNCH templates and/or amount distortion are selected to indicate to be present in Distortion in content.In some embodiments, comparator 604 (a) and distortion estimator 604 (b) are combined into single component (example Such as, comparator 604 (a)).
Template can be stored in storage assembly 606.PACKET assembly components 608 are configured to receive at least PACKET and pass One or more of received SYNCH and predistortion synchronization template are obtained in comparator 604 (a) or are not distorted SYNCH templates it Between matched success or failure instruction.After detecting successfully SYNCH, PACKET assembly components 608 collect watermark at once The PACKET of frame, the PACKET determine component 610 for generating error count by PACKET mistakes.Produced error count by Evaluator 612 including decision logic component for determine error count be arrest limit be also above in specified packet error range or Less than the specified packet error range.For example, evaluator 612 can be determined whether to detect conclusive or tentative watermark (and provide and indicate its output).Evaluator 612 can also generate will be due to comparator 604 (a) and/or distortion estimator 604 (b) Detecting SYNCH, it fails to match or the instruction of PACKET is abandoned when can't detect tentative or conclusive watermark.Evaluator 612 Output can be used for triggering operation bidirectional, such as the triggering extension search packet when detecting tentative watermark.The output of evaluator 612 It may include additional information, such as watermark value (that is, watermark state, watermark style etc. after testing), it is credible in such watermark detection The instruction (for example, packet error count, timing error counting etc.) of grade, is present in amounts and type of one or more distortions in content Etc..
The multistage method in conjunction with described in Fig. 5 and 6 realizes overall process load and associated vacation in watermark embedder The efficient balance of positive watermark detection probability, and it is further improved overall robustness and the safety of watermark extracting.
In some embodiments, two step searches that can implement distorted space in such manner make predistortion SYNCH templates Trigger extension extractor operation immediately with matching between candidate's SYNCH patterns is detected, for example, extend to synchronous pattern and/or The position of the search of watermark packet and granularity.It may not be generated in processing load and vacation however, this of extractor operation extends immediately Optimal compromise in terms of positive watermark detection probability.As an example it is assumed that wishing the time constant in -20% to+20% tone It scales and improves conclusive watermark extracting performance in (PITS) distortion range.Search granularity be must be carefully selected properly to fill out Enter predistortion SYNCH template databases 606.It, can if selecting fine search granularity (for example, there is 1%PITS spacing) Must utilize a large amount of predistortion templates (for example, 40 predistortion SYNCH templates and one be not distorted SYNCH templates) in order to by Detect SYNCH patterns in ground.In this scenario, a large amount of predistortion SYNCH templates can negatively affect processing load and false water Print detection probability.In addition, if predistortion template matches have high false SYNCH detection probabilities, then every SYNCH detections can Triggering extension extractor operation, this will increase processing load and false watermark detection probability.On the other hand, if selection rough search Granularity (for example, there is 5%PITS spacing), then there is the possibility that can't detect embedded SYNCH and corresponding watermark PACKET. In addition, if predistortion template matches have too low false SYNCH detection probabilities, it would be possible that cannot detect in distortion content Many watermarks.However, this defect can be compensated by increasing the number of predistortion template using extra process load as cost.Cause This, generates finite population predistortion synchronization template and so that improving true watermark examines using it in such manner in watermark embedder It surveys, processing loads and the balance of false watermark detection probability is advantageous.
Fig. 7 illustrate according to one exemplary embodiment can be executed with generate one group of predistortion watermark template one group of behaviour Make 700.It should be noted that in described group of operation 700 in describing Fig. 7, with reference to predistortion watermark template.However, it should be understood that can needle This class template is generated to synchronous one or both of pattern and known watermark ladle sample formula.For example, there are two effectively to be born The watermark of load can only by one of four different conditions there are senders.In such a system, unique symbol pattern can be with watermark Each of state is associated, and is directed to each unique symbol pattern, the executable described group of operation 700 described in conjunction with Fig. 7.
With reference to figure 7, at 702, one or more pilot signals are generated.These signals can correspond to specific function, such as arteries and veins Punching, SIN function, square-wave, flat image, edge image etc..It should be noted that can be counted using term " signal " to convey Word or the certain types of content of analog form transmitting, reception and storage.Such signal can be by signal processing operations, such as adjust System/demodulation, A/D and D/A are converted, are compressed, resample etc..The pilot tone of (or obtaining in other ways) is generated at 702 Signal be once embedded with synchronous pattern and/or watermark packet and distortion (or being emitted by noisy communication channel) can provide about distortion and How the characteristic of launch channel and such distortion and/or transmitting influence seeing clearly for embedded watermark.In alternative embodiments, it substitutes Pilot signal additionally or alternatively generates or obtains representative content (for example, concatenation of different types of film) at 702.
At 704, pilot signal is made to be embedded with watermark.At 704, embedded pilot signal undergoes one or more distortions.This A little distortions may include, but are not limited to various time-scalings distortions, A/D and D/A distortions, cut, rotation, scaling, space and/or when Between shift etc..At 706, the distortion is applied to host by one or more distortion parameters that may extend across particular range Pilot signal.For example, it can be scaled according to linear session of 1% increment between -10% to+10% (LTS) percentage parameter application LTS is distorted.At 708, watermark is extracted from distortion pilot signal.At 710, for it is each at Work(watermark extracting generates the predistortion candidate's watermark template for corresponding to the certain distortion with certain distortion parameter.At 712, One group of distortion watermark is received from field.In an example, the real generation by noisy communication channel has been undergone in host pilot signal Described group at 712 is generated after boundary's transmitting, by extract watermark from host pilot signal after watermark at 704 insertion It is distorted watermark.For example, the host pilot signal containing embedded watermark can be played back in cinema, be captured and be inputted using Video Camera To watermark embedder to obtain distortion watermark.
At 714, distortion watermark will be received and be compared with candidate predistortion watermark template.This, which compares, can disclose candidate Which one in predistortion watermark template is best match or correlation.At 716, by related predistortion watermark template classification (example Such as, with related or best match order) and be stored in database.In some embodiments, the database may include producing The predistortion watermark template of one subgroup of raw tentative watermark or strong watermark.Note that can the new mistake from field obtained Predistortion template database is updated and/or supplemented when true watermark with new template.
As described in the exemplary pattern of Fig. 7, each distortion in particular range and the group for distortion can be directed to Close the program step for the experimental selection for repeating predistortion watermark template.In some embodiments, in order to will be executed to pilot signal The number of distortion be limited in actual limit, identify critical distortion vector (for example, due to the time in particular range/sky first Between/frequency scaling is attacked, Video Camera captures, low-bit-rate is perceived and is distorted caused by compression etc.).It is then determined critical distortion to Predistortion watermark template of amount and combinations thereof.The all other distortion vector of predistortion template test of critical distortion vector can be compareed (for example, non-critical distortion vector) is to determine the need for additional predistortion watermark template.
Fig. 8 is the simplification figure of the component of some or all of operations in the operation 700 for can be used for executing Fig. 7.Embedded equipment 802 are used for insertion then by the pilot signal for the various distortions for using distortion processing component 804.By distortion processing component 804 The distortion insertion pilot signal of generation is input into extraction device assembly 806, corresponds to certain distortion parameter wherein generating The predistortion watermark template of certain distortion.In fig. 8, these watermark templates are denoted as " WM templates 1 ", " WM templates 2 " etc..Figure 8 also describe the modified embedded navigation content obtained from the field for being input to extraction device assembly 808.In some embodiments, it carries It is same physical device to take device assembly 806 and extraction device assembly 808.In other embodiments (such as distributing is used wherein In the embodiment of processing), it can be that can be located at the not jljl of different physical locations to extract device assembly 806 and extract device assembly 808 Manage entity.
Fig. 8, which further illustrates, waits the distortion watermark from field with the predistortion generated by extraction device assembly 806 It selects watermark template to be compared and makes its matched template matches and classification component 810.The matching of various distortions and sort operation Result be stored in database 812.
In some embodiments, it can skip any candidate to reduce processing load and false watermark detection probability, extractor One or more of predistortion watermark template at watermark location.In following sections, the method is sometimes referred to as in distorted space Sparse search.A disadvantage for skipping the predistortion watermark of a subgroup is the opportunity that extractor can lose watermark extracting.However, If the number on opportunity is fully big, the general impacts on the opportunity missed can be insignificant.In addition, in some embodiments In, if extractor at another stage of watermark extracting program step (for example, under different extraction opportunitys) find it is tentative Watermark, then extractor can be configured with (for example) based on tentative watermark extrapolation exploitation discussed below miss when Some opportunitys in machine.In a kind of version, only access with high successful watermark detection probability the opportunity missed and And the not all opportunity missed.This by accessing only matching and (one or several) the associated mistake of tentative watermark after testing again Those of true parameter opportunity and realize.
When designing the sparse search in distorted space, disclosed embodiment can utilize following two features.First, at random (or pseudorandom) selects the predistortion watermark template of a subgroup.If this decision is deterministic, attacker can test Mode finds certainty pattern by reverse-engineering, and then adjustment is distorted pattern to match skipped search space to escape Watermark detection.
Secondly, if extractor knows that the possibility of existing certain distortion is advantageous.For example, if watermark passes Up to " cinema projection " state in audio-visual content, then typical piracy situation is related to recorded content.For this attack situation, with than The high probability selection of other predistortion templates (for example, time/frequency scaling etc.) is suitble to the predistortion template of type (for example, right It should be in the template of cutting, stretching, rotation etc.).Similarly, if instruction content " trusting in digital encrypted form is conveyed in watermark Source " state, then perception code conversion is that possible attack and with high probability selection predistortion mould associated with perception compression Plate.In general, the probability of predistortion stencil-chosen is proportional to the probability for the certain distortion being present in content, as long as can estimate Count this probability.
In some embodiments, two or more different watermarks are based on into line distortion operation.Two or more Different watermark may include independent SYNCH patterns, routine tests watermark or the combination of SYNCH and tentative watermark.When those water Being imprinted at embedded device has predefined correlation and the relationship when being known to extractor, and any back of the body with this relationship can be used From this quality and quantity for carrying out operation distortion.For example, if two synchronous patterns in horizontal line embedded images and its through inspection It surveys so that its line of connection and horizontal line are at an angle, then it can be assumed that the angle that image is detected by rotation.Similarly, if Periodically it is embedded in audio frequency watermark with period P and extractor is found with audio frequency watermark spaced apart P ', then it can be assumed that content quilt Time-scaling factor P '/P.
Distortion operation based on independent SYNCH patterns can have specific advantages, such as the processing load of reduction.However, making Superior function can be provided with tentative watermark rather than SYNCH patterns, because tentative watermark usually has relatively low false detection probability And preferable position resolution.As mentioned earlier, when compared with the detection of watermark packet, the detections of SYNCH patterns usually by compared with High vacation detection probability characterization.This is done to balance the processing load of extraction procedure step and robustness requirement.Therefore, it is based on Individually the distortion operation of embedded SYNCH patterns can generate incorrect or unreliable distortion estimation.However, if detecting tentative Watermark, then it provides the additional confidence level of the presence of watermark and position after testing.
Once being based on two or more watermark operation amount distortions, next step is whether assessment distortion is reality 's.As an example it is assumed that the image rotation during video record will be not more than 20 degree (relative to horizontal or vertical baselines) or sound The time compression of frequency track will be safe no more than 50%.Any amount distortion of limit is predefined more than those may make figure Picture or audio can not perceive, and therefore, generate the distortion computation of the value beyond those limits and may be attributed to false watermark detection.
When detecting real amount distortion, it then may be selected and/or generate corresponding in the neighborhood being distorted through operation The additional predistortion watermark template of distortion, and the additional predistortion watermark template is used for other watermark search.Predistortion watermark Template can correspond to watermarked frame SYNCH part, watermarked frame PACKET part, watermarked frame combined SYNCH and PACKET The sub-fraction of part or the parts SYNCH or PACKET of watermarked frame.Repeatably make additional predistortion watermark template and warp Watermark correlation is extracted to increase the reliability of watermark detection and to be distorted the reliability of operation.For example, by new watermark mould Therefore the watermark extracting of plate can be generated (and to be compared with the mistake or the correlation higher than its fewer than the tentative watermark previously detected Its high reliability) watermark.Then, it can be used the watermark with higher reliability after testing come estimated distortion of rerunning Amount.(for example, when during real-time playback of the watermark extracting in content occurring) in some in real time application, can be difficult to carry out pair The repeat search of the same segmentation of content.Therefore, in some embodiments, additional predistortion watermark template is only used for subsequent content Segmentation.
Fig. 9 illustrates the one group of operation 900 that can be executed the search to promote distortion according to example embodiments. At 902, tentative watermark is extracted.At 904, amount distortion is estimated in the detection based on two or more tentative watermarks.It lifts For example, as mentioned earlier, can be used two after testing spacing between watermark estimate the linear session in audio content The amount of scaling.At 906, determine whether estimated amount distortion is less than specific threshold.Operation at 906 provides to be estimated to determination Meter distortion whether be reality mechanism.If estimated distortion is higher than threshold value, distortion estimation is abandoned at 912.At this point, institute Group operation 900 is stated back to 902 to wait for the distortion for becoming available for repeating at 904 until another group of feasible tentative watermark to estimate It is calculated as stopping, or another distortion estimation is generated using another group of available tentative watermark.
If distortion estimation is selected and/or is generated at 908 and is additional pre- less than threshold value (that is, being "Yes" at 906) It is distorted watermark template.The algorithm for allowing to generate new predistortion watermark template and associated parameter can be used to realize the pre- mistake at 908 " generation " of true watermark template.Alternatively or in addition, appropriate predistortion watermark template can be selected from database.At 910, volume is used Outer predistortion watermark template detects watermark with higher reliability and/or improves the estimation being distorted to content.
In being distorted content, tentative watermark band is about its accurate location and the uncertainty of parameter.Therefore, distortion fortune Calculation is also approximate.If in conjunction with mentioned by Fig. 9, additional predistortion watermark template can be selected at 908 with improve watermark detection and/ Or distortion estimation.In some embodiments, additional predistortion watermark template is selected in such manner to realize more efficient and reliable water Print detection and/or distortion estimation.In particular, when generating predistortion watermark template, make multiple have watermark in a manner of predefined Content distortion, detect tentative watermark, based on the distortion of tentative watermark estimation after testing, and collect related to through operation distortion The statistics of the mistake of connection.When at watermark embedder the additional predistortion watermark template of selection/generation (for example, the operation in Fig. 9 908) when, it is based not only on estimated distortion (for example, being obtained from operation 904) and based on distortion in the range of anticipation error The such additional predistortion watermark template of selection/generation.Therefore, for each estimated amount distortion, multiple predistortion water may be selected Die plate, all predistortion watermark templates are near estimated distortion.By this method, extraction is significantly improved with highly reliable Property watermark chance, without dramatically increase template matches trial number.
In some embodiments, the estimation to distortion is executed using single test watermark.As mentioned earlier, in order to subtract The processing of small extractor loads and false watermark detection probability, and the predistortion watermark template of an only subgroup can be used to be embedded in The initial ranging of watermark.The template of this subgroup realizes the rough search of distorted space.It is examined when using the coarse of distorted space When measuring single test watermark, if to be searched for compared with fine granulation near the distortion parameter of detection for triggering tentative watermark Distorted space, then in the presence of the good opportunity that can find more reliable watermark.
Figure 10 illustrates can be executed to be embedded in one group of watermark from distortion contents extraction according to one exemplary embodiment Operation 1000.At 1002, watermarked frame is received, and at 1004, carries out the multi-step search to tentative watermark.In a reality In example, the operation at 1002 and 1004 is executed using described group of operation described in conjunction with Figure 5.At 1006, it is determined whether inspection Measure tentative watermark.If tentative watermark is not detected, operation 1000 continues at 1018, under wherein system waits for One tentative watermark.If instruction detects that tentative watermark, operation 1000 continue at 1008 to determining at 1006, Middle estimation distortion information.For example, the estimation of distortion information may include determining the specific mistake being present in received content The very amount of (or distortion combination).In one embodiment, this estimation can be executed by following operation:Collect watermarked frame it is one or more A parts SYNCH (or obtaining the compiled parts SYNCH in other ways);And by itself and the certain distortion corresponding to various amounts One or more predistortions SYNCH templates of (or distortion combination) are compared.As mentioned earlier, in some embodiments, according to It is executed to the estimation of amount distortion and/or the detection of tentative watermark according to the rough search of distorted space.It is produced according to this rough search Raw watermark detection provides the certain distortion that instruction is present in embedded content host or is distorted the estimated of the coarse value of combination Distortion information.
At 1010, selection and/or additional (or supplement) the predistortion watermark template of generation are to carry out the more smart of distorted space Fine searching.In addition the template of selection/generation corresponds to the distortion value in the neighborhood of (rough) distortion value obtained at 1008.It examines The TIPS for considering audio content changes example, the predistortion watermark template of wherein initial group allow in 3%, 6% and 9% value when Between scale space rough or sparse search.If making sound during the rough search of distorted space with 3.5% in this example Frequency content is distorted, then it is follow-up then predistortion watermark template associated with 3%TIPS to can be used to obtain best SYNCH compilations Successful tests watermark packet collects.For this example, additional distortion watermark template (that is, operation at 1010) is selected to may include selecting Select or generate the predistortion watermark mould in the neighborhood that 3%TIPS is distorted (for example, with 2.5% to 3.5% of 0.1% stepping) Plate.
At 1012, reappraised using the predistortion watermark template of new selection/generation associated with tentative watermark Wrap the number of mistake.In one embodiment, in PACKET and the additional predistortion watermark template candidate restored some or All additional predistortion watermark templates are compared to generate associated error count.In this way, new one group of predistortion PACKET Template can be used for the repeat search of the same content section to wherein detecting tentative watermark or in subsequent content segmentation Search.
At 1014, selection generates the packet or packet template of minimal error number.Selected packet/packet template corresponds to more acurrate Ground indicates the amount distortion for the true amount distortion being present in received content.Therefore, in some situations, the packet through reappraising is wrong It accidentally may indicate that the presence (and more acurrate position) of the insertion watermark with higher reliability.For example, the operation at 1014 can Cause to detect strong or conclusive watermark.At 1016, it is used for based on the packet/template renewal for generating best error value at 1014 The distortion information of the following packet of compilation and/or synchronous pattern.
It should be noted that although the operation at 1014, which is described as selection, generates least number of errors purpose packet/template, 1012 and Operation at 1014 should also generate the selection corresponding to low false positive detection probability.In alternative embodiments, using repetitive process To realize the extraction of watermark and to the estimation of distortion.In this embodiment, one at a time selection/generation in the mistake previously estimated Supplement predistortion watermark template in genuine neighborhood.For example, the first supplement predistortion watermark template can correspond to than being used for The content that the predistortion watermark template of tentative watermark detection at 1004 is less slightly is distorted.If the first supplement predistortion watermark mould Plate generates less bit-errors or higher related to candidate watermark, then being to correspond to by the second supplement predistortion watermark stencil-chosen In the content distortion less than the first supplement predistortion watermark template.On the other hand, if the first supplement predistortion watermark template is led Cause the correlation of larger bit-errors number or reduction, then by second supplement predistortion watermark stencil-chosen be corresponding to more than with The content distortion of the associated distortion of predistortion watermark template for the tentative watermark detection at 1004.Iteration can continue directly Until one of the predistortion watermark template best watermark detection of offer and to the best estimate of content distortion.In some examples In, it numerical method (such as dichotomy or Newton method) can be used to promote the convergence of iteration.Iterative process as described above is more Efficiently and with the false detection probability lower than multiple search under fine granulation obtain the most reliable estimation of watermark after testing.
In some embodiments, after detecting tentative watermark, watermark detection is improved using extrapolation technique at once Reliability.In being distorted content, individual watermarks can be corrupted to the effort in spite of distortion operation as described above and compensation But no conclusive watermark detection is possible degree.In these cases, extractor can near tentative watermark after testing after The continuous search to the subsequent watermark in content.However, if finding one or more additional tests watermarks in subsequent searches, that Can operation two or more watermarks joint " weight " and make to use it to further to reappraise watermark presence.
In some embodiments, it can be used and be embedded in pattern dependent on watermark to predict position, the Symbol Style of adjacent watermark And the alternative of watermark parameters.Usually, it is contemplated that the repetition throughout the same watermark of content is embedded in, but more complicated embedded pattern It is advantageous to be possible, and in some cases.For example, in some situations, adjacent watermark can be in a known way (such as when embedded watermark includes with the incremental counter of the insertion of each additional watermark packet, or working as will with different scrambling key When the payload scrambling of adjacent watermark packet) it is different from each other.The feelings of the insertion pattern of known subsequent and/or previous watermark wherein In border, the detection for the tentative watermark that can extrapolate is with the presence of other embedded watermarks in the pre- discharge position in evaluation content and value. In some embodiments, the presence of other watermark styles in predictive content is carried out using tentative watermark after testing.Then test This prediction (for example, using test statistics method is assumed), this can lead to the refusal of the feasibility of watermark detection or confirmation.
Figure 11 A displaying, which has, is similar to the exemplary that the parts SYNCH and PACKET of part those of are presented in Fig. 3 A Watermark frame sequence.After successfully collecting and detecting SYNCH, collect PACKET.When the distortion of significant quantity is applied to content, It can be difficult or impossible to the parts SYNCH of detection watermarked frame.Figure 11 B shows collect after the previous SYNCH that successfully collects PACKET#1.However, due to the parts correspondence SYNCH of watermarked frame #2 and #3 serious distortion and the PACKET#2 and #3 that do not collect. Figure 11 C displayings are held wherein after detecting tentative watermark across watermarked frame #2 and #3 (it is expected that including PACKET#2 and #3) The example of the extrapolation of the tentative watermark of row.In exemplary extrapolation situation, it is contemplated that some symbols in the symbol of extrapolated watermark With the associated symbols in (that is, tentative) watermark of not extrapolating.After the symbol for extrapolated watermark of collecting, it is wrong that symbol is counted at once Accidentally, estimate false watermark detection probability and assign weight to extrapolated watermark.Assigned weight can be added up to evaluate watermark jointly In the presence of and value.
The extrapolation technique of disclosed embodiment includes that can improve the possibility of the embedded watermark of detection while make false watermark detection Probability maintains the feature in desirable limit.In particular, in some embodiments, when extrapolating to search for additional watermark When, additional SYNCH patterns need not be found so as to the next watermark packet symbol that collects.In being distorted content, many SYNCH samples Formula is likely to be broken and can not recognize.However, even if not being directed to the portions SYNCH that all potential watermarked frames detect watermarked frame Point, the extrapolation technique of present application still realizes compilation and the use of packet symbol.
In addition, in some extrapolation techniques in the extrapolation technique of disclosed embodiment, to detect extrapolated watermark The number that extraction is attempted can be as low as 1.It therefore, there is no need to adjust the weight assigned to extrapolated watermark symbol to maintain wanted false inspection Survey probability.However, in a particular embodiment, in order to count and it is associated with the distortion estimation of tentative watermark and true place not really It is qualitative, can be used it is several start offset and several distortion estimations execute watermark extrapolation attempt.The method promote realize robustness with Optimal compromise between false detection probability.Even if in this scenario, the number of trial is still significantly lower than is based on embedded water wherein In the system that the independent detection triggering weight of print adds up.In this independent detection of embedded watermark, each watermark is (for example, each Tentative watermark) detection need the detections of the associated parts SYNCH, as illustrated in Fig. 3 B and 11B.
Exemplary plot of the false watermark detection probability of Figure 12 displayings to watermark weight threshold.Exemplary graph in Figure 12 Figure corresponds to the experimental result obtained for the watermarked frame with binary character, and the binary character, which has, is embedded in audio The parts 32 SYNCH in content and 64 parts PACKET.Curve 1220 corresponds to the sparse granular search of distorted space, and Curve 1240 is corresponded to the fine granulation obtained using the watermark extrapolation technique of disclosed embodiment and searched for.Figure 12 also shows that correspondence In the independent recovery operation based on watermark to realize the third curve 1260 of the false watermark detection probability of the cumulative extractor of weight. Note that being directed to about 5 × 10-9False watermark detection probability, it is (sparse and finely search using disclosed tentative watermark extrapolation technique Both ropes) watermark weight threshold be less than independent weight accumulation techniques used in threshold value.In this way, with based on embedded watermark The weight accumulation techniques of independent detection are compared, the disclosed extrapolation technique of the extrapolation based on the tentative watermark previously detected compared with Low calculation processing load is lower to generate similar or preferable false positive performance.Meanwhile it is opposite with the detection of conclusive watermark, based on previous The detection of the extrapolation of the tentative watermark of detection needs relatively low watermark detection threshold value for the detection of tentative watermark.These features Greatly improve the robustness performance of watermark embedder.
Figure 18 illustrates the one group of operation 1800 that can be executed with watermark of extrapolating according to one exemplary embodiment.1802 Place, extracts tentative watermark.For example, the operation at 1802 may include combining in the discussed operations of Fig. 5,9 and 10 extremely Some few operations.At 1804, one or more extrapolated watermarks are formed.For example, embedded host can be positioned at by obtaining Realize that this packet is formed in content relative to the symbol of the potential watermarked frame at the predefined position of extracted tentative watermark. At 1806, extrapolated watermark and extracted tentative watermark are evaluated jointly.At 1808, evaluating whether jointly for watermark is determined Cause to meet and wants false watermark detection probability.For example, this wants false watermark detection probability to can correspond to and conclusive watermark Associated detection probability.
According to disclosed embodiment execute watermark extrapolation amount depend on distortion essence and distortion estimation it is accurate Property.For example, in the situation for the audio frequency watermark that the acoustic propagation due to content host is distorted, when ambient noise and reverberation are seen When like being main distortion sources, time-scaling distortion is usually insignificant.In the environment, it is assumed that it is periodically embedded in watermark, It may carry out the successful extrapolation across several watermark length.On the other hand, it if content is attacked by time-scaling, can limit System accuracy associated with estimation time-scaling distortion, and therefore, only peanut watermark is extrapolated on each time orientation Can be feasible.
In some cases, distortion changes due to content conversion or intentional attack and in the time or spatially.For example, Known audio tape player is generated due to the variation of the speed of the motor of tape player and is trembled or trembleed illusion.Therefore, Generated time-scaling factor is changed over time based on the variation of motor speed.Similar techniques can be used to do in attacker Disturb the appropriate estimation and compensation of the time-scaling distortion in the content of watermark.However, a warning is too fast and/or too big The distortion of time change generally produces offensive perception illusion and reduces the feasibility of attack.Therefore, exploitation exists Increase the more effective right of the robustness of watermark extracting in the watermark duration in the case of the distortion of slowly varying time change Error resilience mistake can be beneficial.
The experiment instruction carried out by inventor, when being distorted slowly varying in the length of watermark, usually by probably suitable The predistortion SYNCH templates for closing certain within the scope of distortion variations realize tentative watermark detection.However, being typically larger than In the duration of the watermark PACKET of the parts SYNCH, distortion can be fluctuated to outside the detection range in predistortion watermark template Value.This means that predistortion packet template can only match the actual distortion of the limited section of watermarked frame, causes notable symbol wrong whereby Accidentally rate.
According to some embodiments, know embedded watermark symbol pattern (for example, by the experiment previously detected in advance wherein Property watermark payload, pass through and consider only one group of limited payload etc.) situation in, entire watermark interval is divided into several It is segmented and carries out watermark extracting trial for each segmentation.It can refer to Figure 11 D and more fully understand this operation.Note that in Figure 11 D Horizontal scale those of may differ from Figure 11 A to 11C horizontal scale.To detect and/or try from the SYNCH of PACKET#1 The property tested watermark detection obtain distortion estimation start, using in the predistortion watermark template corresponding to estimated distortion value one or More persons attempt the extraction of the first watermark segmentation SEG1.In some embodiments, SEG1 include SYNCH's it is contemplated that PACKET#1 it Afterwards all or part of.For example, if watermarked frame is made of 20 SYNCH and 100 PACKET, in an example In, each segmentation may include 20 positions (that is, 6 segmentation/frames).In another example, each segmentation may include 30 positions (that is, 4 A segmentation/frame).In a further example, each segmentation may include 10 positions (that is, 12 segmentation/frames).It, can in another example The parts SYNCH are skipped, and can only execute the two stage cultivation of the parts PACKET of watermarked frame.Above example is not intended to provide different points The exhaustive list of Duan great little and segmented configuration, but being provided to illustrate can be based on watermark detection system and intended application It needs and ability selects different fragment sizes and configuration.
In some embodiments, range (for example, the duration, spatial dimension etc.) choosing based on extracted tentative watermark Select the number of segmentation.For example, the watermark with smaller payload can be segmented into than the water with larger payload Print few segmentation.Determine that the other factors of the number of segmentation are the amount distortion in embedded content host in the presence of (or expecting exist) And/or there is the type of distortion of (or expecting exist) in embedded content host.The selection of the number of segmentation can based on (citing come Say) amount distortion and type dynamically change, or can statically or semi-statically carry out, wherein the number being segmented is fixed. In addition, can based in content expectation amount distortion and/or type select the length of each segmentation.
Referring back to Figure 11 D, in some embodiments, the predistortion watermark template closest to estimated distortion value is used for The extrapolated detection of SEG1 and one or more predistortion watermark templates corresponding to the distortion near estimated distortion value.Nothing It is matched by which and attempts to generate optimum, be associated the beginning distortion estimation that distortion levels are used as next segmentation SEG2.On Operation mentioned by text for extrapolated watermark other segmentation SEG2 ..., SEG K continue.It by this method, can be by using proper When predistortion watermark template effectively tracks and alleviates slowly varying distortion.
Figure 13 illustrates can be executed to extrapolate one group of watermark on the basis of by segmentation according to one exemplary embodiment Operation 1300.At 1302, watermarked frame is received, and at 1304, carries out the multi-step search to tentative watermark.In a reality In example, the operation at 1302 and 1304 is executed using described group of operation described in conjunction with Figure 5.At 1306, it is determined whether inspection Measure tentative watermark.If tentative watermark is not detected, described group of operation 1300 continues at 1320, wherein system Next frame is waited for, and then repeats the operation carried out at 1302 to 1306.If instruction detects experiment to determining at 1306 Property watermark (that is, at 1306 be "Yes"), then described group of operation 1300 continues at 1308, wherein estimating distortion information.It lifts For example, to the estimation of distortion information may include the amount for determining the distortion (or be distorted combination) being present in received content and Type.In one embodiment, this estimation can be executed by following operation:It (or has been converged the parts SYNCH for the watermarked frame that collects The parts SYNCH of volume);And by one or more predistortions SYNCH of itself and (or several) certain distortion corresponding to various amounts Template is compared.As mentioned earlier, the estimation and/or examination to amount distortion are usually executed according to the rough search of distorted space The detection of the property tested watermark.
At 1310, the granularity of search is determined.The granularity of particular default selection search can be initially based on (for example, pre- lose The number really wrapped and its spacing in distorted space), estimated distortion information can be based on for initial fragment evaluation adjustment institute It states granularity and/or the granularity can be based on error minimization criterion on the basis of by segmentation.It can be based on wanting false watermark detection Probability, robustness and computational complexity select the criterion.In some embodiments, it is adjusted in response to observed or expecting distortion Fit the criterion.Based on error minimization criterion, by the predistortion watermark template at segmentation stage, (it can be locally resident in watermark At extractor or remotely reside at database) it rearranges and reclassifies to meet error minimization criterion.In addition, can It updates for selecting the selection rule of predistortion watermark template so that watermark extrapolator can select one group of optimum pre-distortion water Print segmentation template.In some embodiments, error minimization criterion further triggers the new steganography that can be used for extracting subsequent watermark The selection of key.Can carry out in such manner stego-key selection with optimize be embedded in the watermark in content host extraction it is steady At least one of property, safety and computational efficiency.In addition, the selection of one or more stego-keys may be adapted to expect content host Transformation.For example, the transformation can be changed with the appearance of at least one watermark of the first insertion stego-key insertion so that At least one embedded watermark is seemed with the second insertion stego-key insertion.
Referring back to Figure 13, at 1312, the watermark extrapolation of considered segmentation is executed.In some embodiments, 1312 The operation at place includes that the symbol for the segmentation that will be considered is compared with one or more predistortion watermark templates at segmentation stage.It lifts For example, compared with "or" (XOR) operation different by turn between fragment bit and the position of predistortion watermark template can be used to execute this.Base Granularity in search and estimated distortion information can carry out one or more extrapolations for (for example) generating one or more error values It attempts.Operation at 1312 further comprises selecting best matching result (for example, generating least number of errors purpose result). At 1314, processed all segmentations are optionally determined whether.Can by by the number of segmentation processed so far be based on Including after testing the length, existing amount distortion of tentative watermark packet and the factor of type etc. and expect include watermark packet point The number of section is compared and makes this determination.In some embodiments, it is not necessary to handle all segmentations.In this way, can jointly across Outer postpone for crossing one or more segmentations of the range smaller than tentative watermark (for example, duration, spatial dimension etc.) is held at once Row subsequent operation (that is, operation at 1316 and 1318).In these embodiments, the operation at 1314 may include information whether The determination of predetermined number segmentation in the range of processing 1 to k.In some embodiments, k is to expect to include a watermark packet The number of segmentation.In other embodiments, k be expect include more than one watermark packet segmentation number.Wherein through processing Segmentation is jointly across in the embodiment of the range smaller than tentative watermark, if the operation at 1318 cannot generate desired result, It can so handle and assess additional extrapolated segmentation.
Referring back to Figure 13 and assume to perform the operation at 1314, if instruction must be handled additionally determining at 1314 Segmentation (that is, being "No" at 1314), then described group of operation 1300 returns to 1308, and the knot of the extrapolation based on previous segment Fruit obtains the new estimation of distortion information.For example, at 1308, the estimation of distorted space can be refined (for example, based on 1312 Place generates the predistortion watermark template of best matching result).
If determining the processed all segmentations (being "Yes" at 1314) of instruction, described group of operation 1300 at 1314 Continue at 1316, wherein assigning weight to each segmentation.In an example, according to the equation provided in following sections (9) and (10) assign weight.At 1318, the presence of the common assessment watermark based on one or more segmentations and value.Citing For, the weight assigned at 1316 can be added together to and have itself and expression the power of the detection of the watermark of specific reliable grade Weight threshold value is compared.It should be noted that described group of operation 1300 depicted in figure 13 can be executed with different order order.Citing comes It says, can be immediately performed simultaneously or after the watermark extrapolation for executing each segmentation to segmentation appointment weight.It should further note The program step of meaning, distortion tracking as described above also increases false watermark detection probability.Therefore, it is necessary to carefully to ensure false knot It is maintained in predefined limit by property watermark detection probability.
Figure 14 is some or all of behaviour in the operation that can be used for executing Figure 13 and/or Figure 18 according to disclosed embodiment The simplification figure of the specific components of work.The component shown in Figure 14 can reside at least partly can (for example) play, remember In record, the content disposal plant for copying, transmitting or accessing content in other ways.Content reception device assembly 1402 is configured to connect Receive modified embedded content.Modified embedded content can (for example) be intentionally or accidentally to be lost containing embedded watermark and suffering from Genuine content.Modified embedded content is received to provide to multi-step searching component 1404, multi-step search groups with appropriate format Part 1404 is configured to generate one or more the tentative watermarks and segmentation that will suffer from extrapolation.Multi-step searching component 1404 can profit With the stego-key supplied by stego-key selection component 1410.Stego-key can be stored in stego-key storage assembly 1408 On.Watermark extrapolation device assembly 1406 is configured to execute watermark extrapolation for entire watermarked frame or on the basis of by segmentation.One In a little embodiments, stencil-chosen component 1418 is configured to fully or reception/retrieval predistortion watermark on the basis of by segmentation Template.For example, stencil-chosen component 1418 can retrieve one or more predistortion watermark templates from database 1416 and make it It can be used for watermark extrapolation device assembly 1406.
Referring back to Figure 14, error minimization criterion determines that component 1412 is configured to receive and is extrapolated device assembly by watermark 1406 results generated.Error minimization criterion determines that component 1412 can further be configured to from user or allow mistake most Smallization criterion determines that component 1412 determines that the larger system for the granularity of being searched for or the entity in device receive additional input.Mistake Minimize criterion determine component 1412 be further configured to stego-key selection component 1410, stencil-chosen component 1418 and Template rearranges the communication of component 1414 and conveys new search granularity, update stencil-chosen rule etc. with (for example).Template Rearrange component 1414 be configured to it is pre- based on determining that information that component 1412 provides rearranges by error minimization criterion It is distorted watermark template.Template rearranges component 1414 can retrieve predistortion watermark template and by predistortion water from database 1416 Die plate is stored to database 1416.Assessment device assembly 1420 can perform various watermarks evaluation operation, such as to extrapolated segmentation Or watermark assigns weight, extrapolated watermark or its segmentation is compared with predistortion template, determine extrapolated watermark or watermark Segmentation evaluates whether to meet wanted false watermark detection probability, reports amount distortion and the type etc. being present in content host jointly Deng.In some embodiments, assessment device assembly 1420 is incorporated into watermark extrapolation device assembly 1406.
According to some embodiments, the essential of mistake depending on being distorted perhaps content in can polluting promotes watermark extracting. In particular, random or burst error can be injected into the watermark being embedded in content by contents processing and/or the attack of intentional content In.For example, can be moved by unexpected Video Camera by the burst error in the video image of Video Camera capture causes, and institute Burst error in capture audio (for example) can be caused by the undesirable sound (such as cough of people) in background.Root According to some embodiments, there are burst error, if entire watermark estimation vacation water is segmented rather than is directed to for watermark Detection probability is printed, then the performance of watermark extracting system can be enhanced.In an example embodiments, to realize in watermark extracting This enhancing and reduce processing load, substitute and be directed to entire watermark itself operation weight, to entire watermark operation and cumulative individual The weight of segmentation.
Following instance embodiment illustrates how to estimate the weight of individual watermark segmentations.Assuming that watermark segmentation is by n The string of position indicates, and extractor finds that particular fragments contain e bit-errors.For example, can by will include segmentation position with Indicate that the template of the actual bit in the watermark segmentation is compared and determines error number e.Weight W associated with this segmentation (n, e) can be indicated by following equation (9).
In equation (9), wu(n) the expection weight for indicating the non-watermarked segmentation of length n, can be according to following equation Formula (10) indicates.
The expection weight for the non-watermarked segmentation that Figure 15 displayings are generated based on equation (10) is with the segmentation as unit of position Length n and the exemplary plot become.To illustrate the utilization of the curve graph in equation (9) and (10) and Figure 15, examine Consider the candidate watermark PACKET in vicious 64 of wherein 20 positions.According to equation (9), weight associated with this packet is 2.3462.However, if by watermark be divided into two 32 segmentation and if error burst leads to 16 in the first segmentation just 4 bit-errors in bit-errors and the second segmentation, then the accumulated weight of two segmentations is 4.52.Therefore, by individually examining Two segmentations and then combined result are looked into, the presence of the watermark with higher confidence level can be established.In some embodiments, with one Mode selects section length (segmentation limit for or more generally, being such as applicable to multidimensional watermark) different with promotion (or optimization) It is distorted the detection of the watermark in environment.For example, if by the way that there may be in the transmitting insertion of the communication channel of burst error Hold (or its by certain types of distortion), then the section length (for example, 4≤n≤10) in particular range may be selected.At it In its example, some in possible section length (for example, 2≤n≤(watermark frame length/2)) or institute can be used with repetitive mode There is section length to assess potential watermark to select the section length of the generation accumulated weight of highest.
In many cases, multiple watermarks of respective carrying difference payload are embedded into same content.Citing comes Say, content can carrying simultaneously be intended for copy control, content recognition, the identification of content owner, allocator and/or recipient Identification watermark message, to provide and the simultaneously operating etc. of applications.In these cases, different watermarks can have About pay load size, robustness, safety, false detection probability, the different performance requirement of processing load and other requirements. In these systems, each watermark message mostly independently can be embedded in and extracted.
It, can be by extracting one in embedded watermark message with coordination mode when multiple watermark messages are embedded in content Person or both and the extraction for greatly enhancing the watermark message.In particular, in some embodiments, it can reuse and be directed to The distortion estimation that first watermark message executes promotes the second watermark with the performance requirement different from the first watermark message to disappear The extraction of breath.In general, with watermark message (such as the content recognition watermark and/or for distinguishing with larger pay load size Court's watermark of the different copies of content) it compares, it can more efficiently use the watermark message (example with relatively low pay load size Such as copy control watermark) come estimate content be distorted.For example, the watermark message with the smaller payload of band can realize more have The use of power error correction capability.In addition, the watermark message with smaller area occupied can be less susceptible to by time/spatial variations It distortion effect and can be embedded in greater number, improve the robustness of watermark extracting whereby.In addition, can be real with small payload The now use of the more efficient searching algorithm based on the template matches opposite with error correcting/decoding process.Therefore, in some implementations In example, distortion estimation is carried out based on the watermark message with smaller pay load size, and have be directed to using result The Objective extraction of the watermark message of larger pay load size is attempted.
According to some embodiments, when there is multiple watermark messages in the content, by only detecting have with smaller Starting has the extraction of the watermark of larger payload (and relatively low robustness) and further changes when imitating the tentative watermark of load Into the extraction of embedded watermark.It by this method, can be due to preventing to the invalid of the larger payload watermark in non-watermarked content It searches for and realizes and significantly calculate saving.In addition, even in markd content, still eliminate in distorted space to larger effective Load multiple search of watermark.It must carry out less search and also reduce false watermark detection associated with larger payload watermark Probability.The experiment carried out by inventor has disclosed, and in some situations, makes the search to larger payload watermark message and knot The insignificant improvement of watermark extracting efficiency and false positive rate is generated by the detection association of the relatively low payload watermark message of property, but It is significantly reduced the robustness of larger payload watermark message.That is, not enough continually triggering larger payload watermark message Extraction, and therefore waste the sufficient opportunity of the detection of larger payload watermark.Therefore, as mentioned earlier, it is based on experiment Property smaller payload watermark message detection trigger efficiency and processing that larger payload watermark message improves extraction operation Load, while the reasonable robust detection result of larger payload watermark message being provided.
It should be understood that can be individually or collectively real in the device being made of various hardware and/or software module and component Apply various embodiments of the present invention.Disclosed in description when embodiment, independent assembly is illustrated as being configured to sometimes Execute one or more operations.However, it should be understood that can be by the two in this class component or both combination of the above together and/or often One component may include the sub-component that do not describe.In addition, being presented described in the various figures of present application with particular order order It operates to promote the understanding to basic concept.However, it should be understood that this generic operation can be carried out with different order order, and in addition, Additional or less step can be used to execute various disclosed operations.
In some instances, the device described in present application may include processor, memory cell, each other with communication The interface that mode connects, and can be between from desktop PC and/or laptop computer to consumer electronics (such as matchmaker Body player, mobile device etc.) in the range of.For example, Figure 16 diagram illustratings can be implemented various disclosed real in it Apply the block diagram of the device 1600 of example.Device 1600 includes at least one processor 1602 and/or controller, leads to processor 1602 At least one processor unit 1604 of letter and realize directly or by communication link 1608 indirectly with other entities, device, number According at least one communication unit 1606 of the exchange of library and the data and information of network.Communication unit 1606 can be according to one or more Communication protocol provides wired and/or wireless communication ability, and therefore, may include appropriate emitter/receiver antenna, circuit and Port and it can emit and/or receive necessary coding/decoding ability to the appropriate of data and other information.Described in Figure 16 Exemplary device 1600 can be integrated into that content disposal plant, watermark be embedded and/or a part for extraction element.
In the general context for the method or program step that can be implemented on by computer program product in one embodiment Various embodiments described herein are described, the computer program product is embodied in comprising by the computer in networked environment In the computer-readable media of the computer executable instructions (such as program code) of execution.Computer-readable media may include can Loading and unloading type and non-removable formula storage device, including but not limited to read-only memory (ROM), random access memory (RAM), light Disk (CD), digital versatile disc (DVD), Blu-ray Disc etc..Therefore, the computer-readable media packet described in present application Containing non-transitory storage media.In general, program module may include executing particular task or implement the example of particular abstract data type Journey, program, object, component, data structure etc..Computer executable instructions, associated data structures and program module indicate to use In the example of the program code for the step of executing method disclosed herein.Such executable instruction or associated data structures Particular sequence indicate the example of respective action for implementing the function described in such step or program step.According to institute Disclosing the content for being embedded with watermark of embodiment can be stored on storage media.In some embodiments, including one or more not Can perceive this stored content of embedded watermark by the content disposal plant configured with watermark embedder (for example, software or hard Part media player) access when can trigger watermark extracting program step, associated signal processing operation and pass through present application Disclosed in watermark embedder and/or content disposal plant subsequent operation.
The preceding description to embodiment has been presented for the purpose of diagram and explanation.What preceding description was not intended to be exhaustive Or the embodiment of the present invention is limited to revealed precise forms, and can be made according to above-mentioned teachings or can be from various implementations The practice of example obtains modification and version.Embodiment discussed herein is chosen and described so as to explain various embodiments and The principle and essence of its practical application are so that those skilled in the art can be suitable in various embodiments and covering The present invention is utilized in the case of the various modifications of special-purpose.It can be in method, equipment, module, system and computer program product All possible combinations in combine the feature of embodiment described herein.

Claims (44)

1. a kind of method for watermark extracting comprising:
Reception includes the watermarked frame of sync section and packet portion, and the watermarked frame is obtained from the content for being embedded with watermark;
The received sync section is compared with one or more predistortion synchronization templates;
Identify best match described in watermarked frame the received sync section predistortion synchronization template, with select with it is identified The predistortion synchronization template one or more associated type of distortion and amount distortion indicate to be present in the content The distortion;And
Received watermarked frame described in an at least outcome evaluation based on the comparison.
2. according to the method described in claim 1, wherein at least generating one or more described pre- mistakes partially by following operation True synchronization template:
Generate multiple navigation contents;
The multiple navigation content is set to be embedded with the watermark including sync section;
Make the multiple embedded navigation content distortion by one or more distortions;And
Candidate predistortion synchronization template is obtained from the multiple distortion navigation content.
3. according to the method described in claim 2, it further comprises:
The multiple embedded navigation content of a subgroup is received after by transmitting media transmission, wherein the transmitting media will One or more distortions are introduced into the multiple embedded navigation content of the subgroup;
It will be in the sync section of the multiple navigation content of the receive subgroup and the candidate predistortion synchronization template Each is compared;And
Selection is matched with the sync section of the multiple navigation content of the received subgroup in predefined tolerance One or more candidate predistortion synchronization templates.
4. according to the method described in claim 1, wherein described relatively generate one or both of the following terms:
The error count of each of one or more predistortion synchronization templates indicates that the described of the watermarked frame is connect Receive the number of the mismatch symbol between each of sync section and one or more predistortion synchronization templates;And
The correlation of each of one or more predistortion synchronization templates indicates the synchronous portion of the watermarked frame Divide and to what extent matches each of one or more described predistortion synchronization templates.
5. according to the method described in claim 1, it further comprises:
Distortion and/or distortion combination for each type is with the predistortion synchronization template described in order tissue, wherein institute of presorting Stating order of presorting keeps the with the relatively high likelihood for indicating real content distortion first candidate predistortion synchronization template ranking high In the second candidate predistortion synchronization template with the property of may be less likely to for indicating real content distortion.
6. according to the method described in claim 1, the wherein described assessment is generated to there are the instructions of one of the following terms:
Tentative watermark indicates the candidate water for having more than the associated false watermark detection probability for wanting false watermark detection probability Print,
Conclusive watermark indicates the associated false watermark detection for having less than or equal to false watermark detection probability is wanted after testing The watermark of probability,
One or more type of distortion and the amount distortion being present in the content.
7. according to the method described in claim 1, wherein:
The content includes at least first and second watermark message;
First watermark message has the payload less than second watermark message;
Assessing the received watermarked frame causes first watermark message being detected as tentative watermark;And
Second watermark message is extracted using the content distortion estimation obtained for the tentative watermark.
8. according to the method described in claim 1, it further comprises:
Tentative watermark is extracted from content host, it is more than the phase for wanting false watermark detection probability that the tentative watermark, which indicates to have, The candidate watermark of the false watermark detection probability of association;
It is positioned at by acquisition potential at the predefined position relative to the extracted tentative watermark in the content The symbol of watermarked frame and form one or more extrapolated watermarks;And
Determine whether the extrapolated watermark described when being evaluated jointly with the watermark tentative after testing meets wanted false watermark inspection Survey probability.
9. according to the method described in claim 8, the symbol location of the wherein described potential watermarked frame in the content At the time predefined of the extracted tentative watermark and/or spatial position.
10. according to the method described in claim 8, the wherein described determination includes:
Determine the number of the mismark in one or more of described extrapolated watermark;
The described of mismark is based at least partially on through the one or more into the extrapolated watermark that ascertains the number to refer to Send weight;And
It determines whether described when combine with the watermark tentative after testing weighted extrapolated watermark meets and described wants vacation Watermark detection probability.
11. according to the method described in claim 10, wherein determining each extrapolated water by one or more of the following terms The number of the mismark of India and China:
The comparison of the extrapolated watermark symbol and the symbol of the extracted tentative watermark;
Execute the error-correcting code decoding of the extrapolated watermark symbol;And
The comparison of the extrapolated watermark and one or more predistortion watermark templates.
12. according to the method described in claim 8, wherein:
It forms the extrapolated watermark to be included in by the symbol for obtaining the potential watermarked frame on the basis of segmentation, wherein each segmentation Including two or more watermark symbols;And
The determination includes:
Obtain the number of the mismark in one or more segmentations;
Be based at least partially on the number of the mismark in each of one or more described segmentations to described one or Weight is assigned in each of multiple segmentations;
The combination assigned weight associated with one or more described segmentations is to generate one or more weighted extrapolated water Print section;And
Determine whether the weighted extrapolated watermark section described when being combined with the watermark tentative after testing meets the institute Want false watermark detection probability.
13. according to the method for claim 12, wherein obtaining the mistake symbol in each of one or more described segmentations Number the number include:
By the symbol and one or more predistortions of the potential watermarked frame in each of one or more described segmentations Watermark template is compared;And
The counting of each of one or more described segmentations is generated, described count indicates described in one or more described segmentations The number of mismatch symbol between the symbol of potential watermarked frame and one or more described predistortion watermark templates.
14. according to the method for claim 12, wherein determining the extrapolated water based on one or more of the following terms The number of segmentation in print:
The range of the extracted tentative watermark;
The amount distortion being present in the content;And
The type of distortion being present in the content.
15. according to the method for claim 12, being wherein at least based in part on not the adding equal to particular fragments in length The weight of particular fragments described in the expection weight assignment of watermark segmentation.
16. according to the method described in claim 8, wherein described the wanted false watermark detection probability corresponds to the inspection of conclusive watermark It surveys.
17. according to the method described in claim 8, it further comprises that report is present in the distortion in the embedded content host Or the estimation of the amount and type of distortion combination.
18. according to the method for claim 12, being wherein at least based in part on one or more of the following terms to determine often The range of one segmentation:
It is expected that being present in the amount distortion in the content;And
It is expected that being present in the type of distortion in the content.
19. according to the method described in claim 1, it further comprises
From the multiple tentative watermarks of the contents extraction, it is more than to want false watermark detection probability that each tentative watermark, which indicates to have, Associated false watermark detection probability candidate watermark;
Using in the extracted tentative watermark both at least obtain with one be present in the embedded content host or Multiple associated estimated distortion informations of distortion;
Based on the estimated distortion information, one or more predistortion watermark templates are obtained;And
At least one of described extracted tentative watermark is reappraised using one or more described predistortion watermark templates.
20. according to the method for claim 19, wherein described reappraise leads to one or more of the following terms:
Detecting compared with the false watermark detection probability for being associated with each of described extracted tentative watermark has through changing Into the watermark of false watermark detection probability;
It detects with conclusive less than or equal to the associated false watermark detection probability of the wanted false watermark detection probability Watermark;And
Get the improved estimation for the distortion being present in the embedded content host.
21. according to the method for claim 20, wherein using two of described at least two extracted tentative watermarks or More than two sync sections obtain the estimated distortion information.
22. according to the method described in claim 1, it further comprises:
From the tentative watermark of the contents extraction, it is more than the phase for wanting false watermark detection probability that the tentative watermark, which indicates to have, The candidate watermark of the false watermark detection probability of association;
Certain distortion or the distortion that instruction is present in the embedded content host are obtained using the extracted tentative watermark The estimated distortion information of the coarse value of combination;
Selection corresponds to one or more supplement predistortion watermark templates of one or more distortion values near the coarse value;And
The extracted tentative watermark is reappraised using one or more described selected supplement predistortion watermark templates.
23. according to the method for claim 22, wherein obtaining the estimated distortion information and including:
With coarse-grained selection corresponding to multiple rough predistortion watermarks of certain distortion or the range of the distortion value of distortion combination Template;
Each of the extracted tentative watermark and the multiple rough predistortion watermark template are compared;And it is logical It crosses the first rough predistortion watermark template of extracted tentative watermark described in identification best match and obtains the estimated mistake True information.
24. according to the method for claim 22, wherein described reappraise causes to detect and wanted with being less than or equal to The conclusive watermark of the associated false watermark detection probability of false watermark detection probability.
25. according to the method for claim 22, wherein it is described reappraise including:
One or more described supplement predistortion watermark templates are compared with the extracted tentative watermark;
It generates and indicates the corresponding supplement predistortion watermark template with each more associated error count, the error count To what extent match the extracted tentative watermark;And
The supplement predistortion watermark template of the selection corresponding to minimum produced error count.
26. a kind of device for watermark extracting comprising:
Receiver, be configured to receive include sync section and packet portion watermarked frame, the watermarked frame is from being embedded with water The content of print obtains;
Comparator is configured to that the received sync section is compared and is known with one or more predistortion synchronization templates The predistortion synchronization template of the received sync section of watermarked frame described in other best match indicates to be present in described with selection One or more type of distortion and amount distortion of the distortion in content;And
Evaluator is configured to received watermarked frame described in an at least outcome evaluation for device based on the comparison.
27. device according to claim 26, wherein the comparator be configured to generate one of the following terms or The two:
The error count of each of one or more predistortion synchronization templates indicates that the described of the watermarked frame is connect Receive the number of the mismatch symbol between each of sync section and one or more predistortion synchronization templates;And
The correlation of each of one or more predistortion synchronization templates indicates the synchronous portion of the watermarked frame Divide and to what extent matches each of one or more described predistortion synchronization templates.
28. device according to claim 26, wherein one or more described type of distortion and amount distortion with it is described identified Predistortion synchronization template is associated.
29. device according to claim 26, wherein the evaluator be configured to generate in the following terms one or The existing instruction of more persons:
Tentative watermark indicates the candidate water for having more than the associated false watermark detection probability for wanting false watermark detection probability Print,
Conclusive watermark indicates the associated false watermark detection for having less than or equal to false watermark detection probability is wanted after testing The watermark of probability, and
One or more type of distortion and the amount distortion being present in the content.
30. device according to claim 26, wherein:
The content includes at least first and second watermark message;
First watermark message has the payload less than second watermark message;And
The evaluator is configured to generate instruction and content mistake to first watermark message to be detected as to tentative watermark True estimation, wherein extracting second watermark message using the content distortion estimation.
31. device according to claim 26, further comprises
Extractor is configured to from the tentative watermark of the contents extraction, and it is more than to be wanted that the tentative watermark, which indicates to have, The candidate watermark of the associated false watermark detection probability of false watermark detection probability;And
Watermark extrapolator is configured to acquisition and is positioned in the content relative to the extracted tentative watermark Predefined position at potential watermarked frame symbol and form one or more extrapolated watermarks;Wherein
The evaluator is further configured to determine described extrapolated when being evaluated jointly with the watermark tentative after testing Whether watermark meets wanted false watermark detection probability.
32. device according to claim 31, wherein the watermark extrapolator is configured to out of described content opposite Position at the time predefined of the extracted tentative watermark and/or spatial position obtains the institute of the potential watermarked frame State symbol.
33. device according to claim 31, wherein the evaluator is configured to:
Determine the number of the mismark in one or more of described extrapolated watermark;
The described of mismark is based at least partially on through the one or more into the extrapolated watermark that ascertains the number to refer to Send weight;And
It determines whether described when combine with the watermark tentative after testing weighted extrapolated watermark meets and described wants vacation Watermark detection probability.
34. device according to claim 33, wherein determining each extrapolated water by one or more of the following terms The number of the mismark of India and China:
The comparison of the extrapolated watermark symbol and the symbol of the extracted tentative watermark;
Execute the error-correcting code decoding of the extrapolated watermark symbol;And
The comparison of the extrapolated watermark and one or more predistortion watermark templates.
35. device according to claim 31, wherein:
The watermark extrapolator is configured to obtain the symbol of the potential watermarked frame on the basis of by segmentation at least partly Number and form the extrapolated watermark, wherein it is each segmentation include two or more watermark symbols;And
The evaluator is configured to:
Obtain the number of the mismark in one or more segmentations;
Be based at least partially on the number of the mismark in each of one or more described segmentations to described one or Weight is assigned in each of multiple segmentations;
The combination assigned weight associated with one or more described segmentations is to generate one or more weighted extrapolated water Print section;And
Determine whether the weighted extrapolated watermark section described when being combined with the watermark tentative after testing meets the institute Want false watermark detection probability.
36. device according to claim 35, wherein the evaluator is configured at least partially through following operation Obtain the number of the mismark in each of one or more described segmentations:
By the symbol and one or more predistortions of the potential watermarked frame in each of one or more described segmentations Watermark template is compared;And
The counting of each of one or more described segmentations is generated, described count indicates described in one or more described segmentations The number of mismatch symbol between the symbol of potential watermarked frame and one or more described predistortion watermark templates.
37. device according to claim 31, wherein the evaluator is configured to be based at least partially in length Equal to the expection weight of the non-watermarked segmentation of particular fragments the weight is assigned to the particular fragments.
38. device according to claim 31 is present in wherein the evaluator is configured to report in the content The estimation of the amount and type of distortion or distortion combination.
39. device according to claim 26, further comprises
Extractor is configured to from the multiple tentative watermarks of the contents extraction, and each tentative watermark, which indicates to have, is more than Want the candidate watermark of the associated false watermark detection probability of false watermark detection probability;And
Distortion estimator is configured to be obtained using at least the two in the extracted tentative watermark and be present in insertion One or more in content host are distorted associated estimated distortion information and obtain one or more predistortion watermark templates;Its In
Evaluator is configured to reappraise the extracted tentative watermark using one or more described predistortion watermark templates At least one of.
40. device according to claim 39, wherein the distortion estimator is configured to determine the estimated distortion Whether information corresponds to over the amount distortion of certain distortion threshold value, and only corresponds in the estimated distortion information and be no more than institute One or more described predistortion watermark templates are obtained in the case of stating the amount distortion of certain distortion threshold value.
41. device according to claim 39, wherein the distortion estimator is configured to pass through using described at least two Two or more sync sections for extracting tentative watermark obtain the estimated distortion information.
42. device according to claim 26, further comprises
Extractor is configured to from the tentative watermark of the contents extraction, and it is more than to be wanted that the tentative watermark, which indicates to have, The candidate watermark of the associated false watermark detection probability of false watermark detection probability;
Distortion estimator is configured to obtain the spy that instruction is present in the content using the extracted tentative watermark The estimated distortion information of the coarse value of fixed distortion or distortion combination, and select to correspond to one or more near the coarse value One or more supplement predistortion watermark templates of a distortion value;Wherein
The evaluator is further configured to reappraise using one or more described selected supplement predistortion watermark templates The extracted tentative watermark.
43. device according to claim 42, wherein the distortion estimator is configured to:
With coarse-grained selection corresponding to multiple rough predistortion watermarks of certain distortion or the range of the distortion value of distortion combination Template;
Each of the extracted tentative watermark and the multiple rough predistortion watermark template are compared;And it is logical It crosses the first rough predistortion watermark template of extracted tentative watermark described in identification best match and obtains the estimated mistake True information.
44. device according to claim 42, wherein the evaluator is configured to:
One or more described supplement predistortion watermark templates are compared with the extracted tentative watermark;
It generates and indicates the corresponding supplement predistortion watermark template with each more associated error count, the error count To what extent match the extracted tentative watermark;And
The supplement predistortion watermark template of the selection corresponding to minimum produced error count.
CN201280059704.5A 2011-11-03 2012-11-02 Watermark extracting based on tentative watermark Active CN103975605B (en)

Applications Claiming Priority (9)

Application Number Priority Date Filing Date Title
US13/288,952 2011-11-03
US13/288,945 2011-11-03
US13/288,937 2011-11-03
US13/288,937 US8615104B2 (en) 2011-11-03 2011-11-03 Watermark extraction based on tentative watermarks
US13/288,958 2011-11-03
US13/288,958 US8533481B2 (en) 2011-11-03 2011-11-03 Extraction of embedded watermarks from a host content based on extrapolation techniques
US13/288,945 US8923548B2 (en) 2011-11-03 2011-11-03 Extraction of embedded watermarks from a host content using a plurality of tentative watermarks
US13/288,952 US8682026B2 (en) 2011-11-03 2011-11-03 Efficient extraction of embedded watermarks in the presence of host content distortions
PCT/US2012/063431 WO2013067439A1 (en) 2011-11-03 2012-11-02 Watermark extraction based on tentative watermarks

Publications (2)

Publication Number Publication Date
CN103975605A CN103975605A (en) 2014-08-06
CN103975605B true CN103975605B (en) 2018-09-07

Family

ID=48192861

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201280059704.5A Active CN103975605B (en) 2011-11-03 2012-11-02 Watermark extracting based on tentative watermark

Country Status (5)

Country Link
EP (1) EP2774385A4 (en)
KR (1) KR20140097306A (en)
CN (1) CN103975605B (en)
HK (1) HK1197126A1 (en)
WO (1) WO2013067439A1 (en)

Families Citing this family (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7644282B2 (en) 1998-05-28 2010-01-05 Verance Corporation Pre-processed information embedding system
US6737957B1 (en) 2000-02-16 2004-05-18 Verance Corporation Remote control signaling using audio watermarks
CA2499967A1 (en) 2002-10-15 2004-04-29 Verance Corporation Media monitoring, management and information system
US20060239501A1 (en) 2005-04-26 2006-10-26 Verance Corporation Security enhancements of digital watermarks for multi-media content
US8020004B2 (en) 2005-07-01 2011-09-13 Verance Corporation Forensic marking using a common customization function
US8781967B2 (en) 2005-07-07 2014-07-15 Verance Corporation Watermarking in an encrypted domain
US8259938B2 (en) 2008-06-24 2012-09-04 Verance Corporation Efficient and secure forensic marking in compressed
US10664940B2 (en) 2010-03-05 2020-05-26 Digimarc Corporation Signal encoding to reduce perceptibility of changes over time
US8971567B2 (en) 2010-03-05 2015-03-03 Digimarc Corporation Reducing watermark perceptibility and extending detection distortion tolerances
US8477990B2 (en) 2010-03-05 2013-07-02 Digimarc Corporation Reducing watermark perceptibility and extending detection distortion tolerances
US8838977B2 (en) 2010-09-16 2014-09-16 Verance Corporation Watermark extraction and content screening in a networked environment
US8682026B2 (en) 2011-11-03 2014-03-25 Verance Corporation Efficient extraction of embedded watermarks in the presence of host content distortions
US8615104B2 (en) 2011-11-03 2013-12-24 Verance Corporation Watermark extraction based on tentative watermarks
US8923548B2 (en) 2011-11-03 2014-12-30 Verance Corporation Extraction of embedded watermarks from a host content using a plurality of tentative watermarks
US8533481B2 (en) 2011-11-03 2013-09-10 Verance Corporation Extraction of embedded watermarks from a host content based on extrapolation techniques
US8745403B2 (en) 2011-11-23 2014-06-03 Verance Corporation Enhanced content management based on watermark extraction records
US9547753B2 (en) 2011-12-13 2017-01-17 Verance Corporation Coordinated watermarking
US9323902B2 (en) 2011-12-13 2016-04-26 Verance Corporation Conditional access using embedded watermarks
US9571606B2 (en) 2012-08-31 2017-02-14 Verance Corporation Social media viewing system
US9106964B2 (en) 2012-09-13 2015-08-11 Verance Corporation Enhanced content distribution using advertisements
US8869222B2 (en) 2012-09-13 2014-10-21 Verance Corporation Second screen content
US9262794B2 (en) 2013-03-14 2016-02-16 Verance Corporation Transactional video marking system
US9251549B2 (en) 2013-07-23 2016-02-02 Verance Corporation Watermark extractor enhancements based on payload ranking
KR102113503B1 (en) 2013-08-26 2020-06-05 삼성전자주식회사 Electronic apparatus and method for providing contents in the electronic apparatus
US9208334B2 (en) 2013-10-25 2015-12-08 Verance Corporation Content management using multiple abstraction layers
EP3117626A4 (en) 2014-03-13 2017-10-25 Verance Corporation Interactive content acquisition using embedded codes
US10504200B2 (en) 2014-03-13 2019-12-10 Verance Corporation Metadata acquisition using embedded watermarks
WO2016028936A1 (en) * 2014-08-20 2016-02-25 Verance Corporation Watermark detection using a multiplicity of predicted patterns
EP3225034A4 (en) 2014-11-25 2018-05-02 Verance Corporation Enhanced metadata and content delivery using watermarks
US9602891B2 (en) 2014-12-18 2017-03-21 Verance Corporation Service signaling recovery for multimedia content using embedded watermarks
CN106921728A (en) 2016-08-31 2017-07-04 阿里巴巴集团控股有限公司 A kind of method for positioning user, information-pushing method and relevant device
CN109151483A (en) * 2018-09-10 2019-01-04 五邑大学 System based on image and video metadata reversible insertion and extraction
CN110827189B (en) * 2019-11-01 2023-12-05 山东浪潮科学研究院有限公司 Watermark removing method and system for digital image or video

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101751927A (en) * 2008-10-10 2010-06-23 汤姆森许可贸易公司 Method and apparatus for regaining watermark data in an original signal
WO2010135687A1 (en) * 2009-05-21 2010-11-25 Digimarc Corporation Combined watermarking and fingerprinting

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6516079B1 (en) * 2000-02-14 2003-02-04 Digimarc Corporation Digital watermark screening and detecting strategies
US7366908B2 (en) * 1996-08-30 2008-04-29 Digimarc Corporation Digital watermarking with content dependent keys and autocorrelation properties for synchronization
CA2269651A1 (en) * 1998-05-12 1999-11-12 Lucent Technologies, Inc. Transform domain image watermarking method and system
US6483927B2 (en) * 2000-12-18 2002-11-19 Digimarc Corporation Synchronizing readers of hidden auxiliary data in quantization-based data hiding schemes
US7840005B2 (en) * 2002-01-22 2010-11-23 Digimarc Corporation Synchronization of media signals
US20060239501A1 (en) * 2005-04-26 2006-10-26 Verance Corporation Security enhancements of digital watermarks for multi-media content
US7668334B2 (en) * 2004-07-02 2010-02-23 Digimarc Corp Conditioning imagery to better receive steganographic encoding
JP4034776B2 (en) * 2004-11-12 2008-01-16 株式会社東芝 Digital watermark detection apparatus, digital watermark detection method, and program
WO2009031082A1 (en) * 2007-09-03 2009-03-12 Koninklijke Philips Electronics N.V. Apparatus and methods for transferring digital content

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101751927A (en) * 2008-10-10 2010-06-23 汤姆森许可贸易公司 Method and apparatus for regaining watermark data in an original signal
WO2010135687A1 (en) * 2009-05-21 2010-11-25 Digimarc Corporation Combined watermarking and fingerprinting

Also Published As

Publication number Publication date
KR20140097306A (en) 2014-08-06
HK1197126A1 (en) 2015-01-02
WO2013067439A1 (en) 2013-05-10
EP2774385A1 (en) 2014-09-10
CN103975605A (en) 2014-08-06
EP2774385A4 (en) 2015-05-27

Similar Documents

Publication Publication Date Title
CN103975605B (en) Watermark extracting based on tentative watermark
US9704211B2 (en) Signal continuity assessment using embedded watermarks
US8615104B2 (en) Watermark extraction based on tentative watermarks
US8923548B2 (en) Extraction of embedded watermarks from a host content using a plurality of tentative watermarks
US8682026B2 (en) Efficient extraction of embedded watermarks in the presence of host content distortions
US8533481B2 (en) Extraction of embedded watermarks from a host content based on extrapolation techniques
Bhattacharyya A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier
US7616776B2 (en) Methods and apparatus for enhancing the robustness of watermark extraction from digital host content
AU2007327388B2 (en) Video fingerprinting
US20060239501A1 (en) Security enhancements of digital watermarks for multi-media content
US20070165851A1 (en) Watermark detection
CN1988669B (en) Digital marking structure and verifying method in stream medium monitoring and broadcasting
WO2002032031A1 (en) Watermarks carrying content dependent signal metrics for detecting and characterizing signal alteration
WO2006116270A2 (en) Security enhancements of digital watermarks for multi-media content
US8107668B2 (en) Digital differential watermark and method
GB2585773A (en) Methods and apparatus to identify media using hash keys
US20070165852A1 (en) Watermark detection
Xiang et al. Robust and reversible audio watermarking by modifying statistical features in time domain
CN101065769B (en) Method and device for reading digital tattooing
Noga A Visual Data Hash Method
CN1332354C (en) Data content identification
US20070160261A1 (en) Watermark detection by correlation shape analysis
Bhat et al. JHUF-5 steganalyzer: Huffman based steganalytic features for reliable detection of YASS in JPEG images

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1197126

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant
REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1197126

Country of ref document: HK