US20010016058A1 - Method for extracting multiresolution watermark images to determine rightful ownership - Google Patents

Method for extracting multiresolution watermark images to determine rightful ownership Download PDF

Info

Publication number
US20010016058A1
US20010016058A1 US09/164,231 US16423198A US2001016058A1 US 20010016058 A1 US20010016058 A1 US 20010016058A1 US 16423198 A US16423198 A US 16423198A US 2001016058 A1 US2001016058 A1 US 2001016058A1
Authority
US
United States
Prior art keywords
image
indicia
extracting
watermark
embedding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US09/164,231
Other versions
US6373974B2 (en
Inventor
Wenjun Zeng
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Rakuten Group Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US09/164,231 priority Critical patent/US6373974B2/en
Assigned to SHARP LABORATORIES OF AMERICA, INC reassignment SHARP LABORATORIES OF AMERICA, INC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ZENG, WENJUN
Publication of US20010016058A1 publication Critical patent/US20010016058A1/en
Application granted granted Critical
Publication of US6373974B2 publication Critical patent/US6373974B2/en
Assigned to SHARP KABUSHIKI KAISHA reassignment SHARP KABUSHIKI KAISHA ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SHARP LABORATORIES OF AMERICA, INC.
Assigned to RAKUTEN, INC. reassignment RAKUTEN, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SHARP KABUSHIKI KAISHA
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0065Extraction of an embedded watermark; Reliable detection

Definitions

  • This invention relates to digital watermarking of multimedia data for copyright protection.
  • Digital watermarking is a process of embedding information, sometimes referred to as a signature, directly into the media data by making small modifications to the data. The subsequent extraction of the signature from the watermarked media data may be used to identify the rightful owner, the intended recipients, and the authenticity of a media data. Because of the rapid growth of digital imagery, the increasingly easy access to digital media, and the availability of powerful digital image manipulation tools, media security has become an important issue. Digital watermarks have been proposed as a method for indicating copyright ownership of multimedia data.
  • the watermarks should be perceptually invisible, i.e., they should not interfere with the media being protected; Second, the watermark should be sufficiently robust to defeat any attempt to eliminate the watermark, or to forge a fake watermark to establish a counterfeit ownership claim. They should also be sufficiently robust to withstand common signal processing. Particularly, a watermark should be detectable even if common signal processing operations have been applied to the watermarked image.
  • the original un-watermarked image is needed in the detection process.
  • Some previous methods use the original un-watermarked image in the watermark detection process.
  • the watermark sequence may be first extracted by subtracting the original image data from the test (potentially watermarked) image data. While this generally increases the detection capability of the watermarking system, and is helpful for some applications, such as identifying an illegal distributor, it is not applicable to resolving rightful ownership claim. This is because the authenticity of the claimed “original” image is still questionable. An attacker may forge a fake “original” image and a fake watermark and come up with a counterfeit ownership claim.
  • the detector output is not immediately obvious to a jury.
  • Some schemes embed some potentially registered numbers such as an owner ID, or image ID, similar to the ISBN # of a book.
  • the physical meaning of the extracted bits has to be conveyed by an interpreter such as a central registration agent, or a technical expert in the court, which may not be straightforward to a jury.
  • the number of bits that may be embedded and later reliably extracted depends on how severely the watermarked image has been processed. One has to determine the tradeoff between number of bits embedded and the robustness of the watermark to signal processing at the time of watermark insertion. A one bit error in the extracted bits may cause the whole ID number to be invalid.
  • Some methods which embed a binary image, and hence are easier for a jury to understand, however, such techniques still have to use the original image in the watermark extraction process, thus are not applicable to resolving rightful ownership as discussed above. Furthermore, such methods do not allow the watermark detector to adaptively choose the trade-off between the degree of robustness and the resolution of the extracted watermark.
  • a meaningful binary watermark image is embedded and extracted, which will greatly facilitate the process of convincing a jury of an ownership claim. While a statistical technique which may quantify the false alarm detection probability should be considered as a fundamental measure for a valid ownership claim, the ability to extract a meaningful watermark image, i.e., a logo, a registration number, or an image recognizable by a lay person, will greatly facilitate the process of convincing a jury of an ownership claim.
  • a jury usually consists of non-technical people. The presentation of an extracted meaningful watermark image is much more convincing than a numerical value.
  • a method for embedding and extracting visually imperceptible indicia in an image includes embedding a visually imperceptible indicia in an original image; testing a test image for an embedded visually imperceptible indica; and extracting the visually imperceptible indicia from the test image to determine if the test image is a copy of the original image.
  • the method may also include examining segments of varying sizes in the image at the decoder for detecting each bit of the embedded signature, and allows a user of the method of the invention to select trade-offs between resolution and detection performance, and to select an overall level of performance.
  • An object of the invention is to provide a valid, robust watermarking method which will facilitate the process of convincing a jury of an ownership claim.
  • FIG. 1 a is a block diagram for the watermark encoder used in the method of the invention.
  • FIG. 1 b is a block diagram for the watermark detector used in the method of the invention.
  • FIG. 2 a depicts a 64 ⁇ 64 binary watermark image to be embedded.
  • FIG. 2 b depicts the extracted binary image when the test image does not contain the embedded watermark.
  • FIG. 3 a depicts an original 512 ⁇ 512 “Baboon” image.
  • FIG. 3 b depicts a watermarked “Baboon” image.
  • FIG. 4 depicts extracted watermark images from 512 ⁇ 512 watermarked “Baboon”.
  • FIG. 5 a depicts an original 512 ⁇ 512 “Lenna” image.
  • FIG. 5 b depicts a watermarked “Lenna” image.
  • FIG. 6 depicts extracted watermark images from 512 ⁇ 512 watermarked “Lenna”.
  • FIG. 7 depicts extracted watermark images from 512 ⁇ 512 watermarked “Baboon” with JPEG compression with quality factor of 15%.
  • FIG. 8 depicts extracted watermark images from 512 ⁇ 512 watermarked “Baboon” with JPEG compression with quality factor of 5%.
  • FIG. 9 is a graph showing output statistic q as a function of JPEG quality factor Q for 512 ⁇ 512 watermarked “Baboon”.
  • the method of the invention provides an opportunity to exploit the human visual system's (HVS) superior ability to recognize a correlated pattern.
  • HVS human visual system's
  • a watermark decoder is allowed to directly extract a meaningful binary watermark image from the test image to prove image ownership.
  • the human visual system's superior recognition ability is exploited to provide persuasive evidence of copyright ownership to a jury.
  • the method is robust and will withstand common forms of signal processing. As used herein, “robust” means that there is a possibility of correct detection of each bit following signal processing, therefore, a more robust embedding/detection scheme has a higher probability that each bit will be correctly detected following signal processing.
  • the method allows extraction of multiresolution watermark images. Images may absorb various amount of watermark implantation without revealing visual artifacts. More importantly, the watermarked image may undergo different types of signal processing before it is input as the test image to the watermark detector. The watermarks may be treated as a signal to be transmitted, and the original image may be considered a transmission media. However, the channel capacity is variable, depending on the original image characteristics, and on the amount of signal processing applied to the watermarked image. Because channel capacity is unknown at the time of watermark insertion, it is difficult to determine how much information may be embedded and later reliably extracted at the watermark detector.
  • the embedded data rate should be low, therefore less information may be embedded.
  • tailoring to the “worst case” is not desirable, because when the channel condition is good, the possibility of extracting more information to more effectively convincing a jury is sacrificed.
  • a good resolution binary watermark image is always embedded.
  • the watermark detector has the flexibility of extracting watermark images at different resolutions. In other words, the detector has the capability to adapt to the channel conditions. When the channel condition is good, the detector extracts and present a good resolution watermark image, which definitely will convince a jury of a valid ownership claim. On the other hand, when the channel condition is bad, the detector may still be able to extract a coarse resolution watermark image, which hopefully will also convince a jury.
  • the method of the invention which is capable of embedding a good resolution meaningful binary watermark image, one that will make sense to a jury, e.g. a logo image, in an image, and is later capable of extracting different versions of that watermark image with varying resolutions, is disclosed.
  • the method of the invention adaptively chooses the trade-off between robustness and resolution of the extracted watermark image. While a statistical technique which may quantify the false alarm detection probability should be considered as a fundamental measure for a valid ownership claim, the ability to extract a meaningful watermark image will greatly facilitate the process of convincing a jury of an ownership claim.
  • FIG. 1 a depicts the general architecture of a watermark encoder, generally at 10 , using the method of the invention.
  • An original image I, 12 is selected for watermarking.
  • Image 12 may be transformed, in the preferred embodiment, step 14 , into a transformed image having a set of features, I i , in preparation for watermark embedding.
  • Step 14 is not always required.
  • a logo image ⁇ b i ⁇ 16 may be designated and prepared for embedding.
  • a meaningful signature, or key, S 0 , 18 (e.g.
  • an owner name or ID is first mapped, using a one-way deterministic function H 20 , to a single parameter which is then used as a seed of a standard random number generator to generate an independent identical distribution (i.i.d.) pseudo random sequence S 1 , denoted as ⁇ S 1i ⁇ , which defines each point in the sequence.
  • S 1 independent identical distribution
  • S 0 eliminates the possibility of forging a watermark by manipulating the seed to search for a large detector output value, which indicates a low false alarm detection probability, as will be shown later herein.
  • logo image 16 and key 18 are also referred to herein, collectively, as a visually imperceptible indicia, or watermark.
  • Logo image 16 may be an actual logo, or other identifying indicia, selected by the copyright owner, that will be meaningful to a jury, i.e., a jury will immediately recognize logo image 16 as something that belongs to the copyright owner.
  • Key 18 is generally an alpha-numeric, a registration number, such as an ISDN or copyright registration number. It is assumed that key 18 will always be used as the visually imperceptible idicia, while logo image 16 is an optional indicator of ownership.
  • the logo image 16 is modulated, step 22 , with S 1i , and, with perceptual model 24 , which controls the magnitude of G i (I i ), is inserted, step 26 , into I i , forming a watermarked image I′.
  • the meaningful signature is, in the preferred embodiment, a 64 ⁇ 64 bit block, which, when projected on and inserted into a 512 ⁇ 512 image block provides one bit in every 8 ⁇ 8 block of the original image.
  • the signature S 1i is modulated by G i (I i ), where G i (.) could be a function of I i , and then added to I i .
  • the encoding function E is illustrated in Eq. (1).
  • the test image 32 , X is transformed, step 34 , to yield a feature set ⁇ ( i ⁇ .
  • the random sequence ⁇ S 1i ⁇ is first developed by subjecting S 0 to H. Then a correlating signature ⁇ S 2i ⁇ is generated based on ⁇ S 1i ⁇ and the perceptual model 24 .
  • X i is demodulated by S 2i , under the control of perceptual model 24 , to yield extracted watermarked bits 40 , if present.
  • S 2i may be optimized, block 37 , to improve detector performance.
  • the correlator output q is compared to a threshold T to determine if the test image is a watermarked one. Detection of the watermarks is accomplished via the hypothesis testing:
  • N i noise, possibly resulted from some signal processing such as JPEG compression, etc.
  • sequence ⁇ Y i ⁇ is stationary and at least 1-dependent (A sequence ⁇ Y i ⁇ is 1-dependent if (Y 1 , . . . , Y k ) and (Y k+n , . . . , Y k+n+m ) are independent whenever n>1), and that ⁇ S 2i ⁇ is zero mean and un-correlated with the original image I. Then under H 0 for large n, q is approximately a normal distribution with zero mean and unit variance, i.e., q ⁇ N(0, 1).
  • E(N i S 2i ) may not be equal to zero, since N i could have some correlation with S 2i .
  • the noise introduced by zeroing out some of the coefficients due to, e.g., coarse quantization
  • S 1i the coefficients of the coefficients
  • S 2i the noise introduced by zeroing out some of the coefficients (due to, e.g., coarse quantization) is highly correlated with S 1i , and thus may potentially have high correlation with S 2i .
  • the output q is compared to a threshold T. If q>T, the test image is declared to have been signed with the claimed signature ⁇ S 1i ⁇ . Otherwise it is not.
  • G i (.) is a function of I i
  • S 2i is S 1i W i .
  • the scheme presented above essentially extracts one bit information from the entire test image X, i.e., whether the claimed signature 18 (S 0 ) is embedded in the test image or not.
  • One may embed/extract more bits by segmenting the whole image into smaller segments, that may or may not overlap, and then embed/extract one bit for each segment.
  • a segment may be defined as a collection of data located in various parts of the image.
  • N i is noise
  • index i corresponds to data in one particular segment.
  • G i (.) is independent of I i
  • the optimal choice of S 2i is G i S 1i .
  • G i (.) is a function of I i
  • S 1i W i is a good choice for S 2i .
  • setting S 2i to G i (I i ) S 1i is generally not a good choice.
  • the method should embed a meaningful binary watermark image. While a large detector output value, which quantifies the false alarm detection probability, should be considered as the fundamental measure for a valid ownership claim, the ability to extract a meaningful watermark image is very useful in convincing a jury of the claim of ownership.
  • the extracted watermark image serves as a visual measure of the “invisible” watermarks embedded in the test image. It has an additional advantage of exploiting the human visual system's superior ability to recognize a correlated pattern. It is well known that, unlike traditional data, visual data may be “lossy”, and less sensitive to detection errors. Human eyes easily filter out random noise and recognize a correlated pattern, in a way similar to how channel coding detects and corrects transmission errors. Another advantage is that visual data usually has high spatial correlation. This property may be used to enhance the detection performance, and will now be described.
  • the detector At the detector, one may usually correctly extract one bit from each 8 ⁇ 8 test image block, if the watermarked image does not suffer from much image processing. However, if the watermarked image does undergo some image processing, the bit will not be extracted reliably and the detection error will increase. In this case, the method exploits the spatial correlation of the binary watermark image to improve detection performance.
  • each watermark bit is embedded in a small block such as an 8 ⁇ 8 block, and at the decoder the image is still first segmented into 8 ⁇ 8 blocks.
  • the segments associated with neighboring bits, a are used to detect the current bit.
  • b i is the corresponding bit (+1/ ⁇ 1) embedded in a particular 8 ⁇ 8 block.
  • the second term accumulates and is the major factor to determine the embedded bit.
  • a bit in a homogenous region of the watermark image usually has the same value as the surrounding bits.
  • [0060] is increased, thus reducing the detection error.
  • increasing the window size may not necessarily reduce the detection error, because the b i embedded in other blocks may not have the same sign as the b i embedded in the current block. Therefore the extracted binary watermark image may lose its resolution around edges, even though it is more robust to signal processing in the homogenous region.
  • the trade-off here is robustness of detection of each bit vs. resolution of extracted watermark image.
  • An important feature of the method of the invention is that the watermark detector is allowed to adaptively choose the trade-off between robustness and resolution. The use of a larger number of segments for detection of a single, or current, bit tends to eliminate noise and increase robustness, except at the edges of the image.
  • a small detection window i.e., a relatively small number of segments, generally having 8 ⁇ 8 or more bits per segment, is chosen and a good resolution watermark image will be extracted.
  • robustness is a concern and the number of segments involved for detecting each bit should be increased.
  • a coarse resolution watermark image may be extracted.
  • increasing the detection window size to increase the robustness is different from applying some noise-reduction operations, such as media filtering, to the extracted watermark image obtained by using only one block in the bit extraction process. In the latter case, each bit is detected independently first, and each is more vulnerable to channel noise. Once enough bits are in error, rendering an unrecognizable extracted image, no noise-reduction operation may recover a recognizable pattern. However, increasing the detection window may still extract a meaningful pattern, as shown in FIG. 7.
  • the computation overhead for extracting multiresolution watermark images instead of a single watermark image is very small, because the same multiplication operations are shared and only a few additions are needed when the detection window size is increased.
  • the same binary watermark image may be embedded in a group of frames. Since the detection window now has one more dimension, the embedded watermark image is much more robust.
  • a single frame is subject to the attack of trying to eliminate the watermarks by doing some sort of averaging from the neighboring frames. In other words, the capability of extracting the watermark image from a single test frame may be adversely affected.
  • the same random sequence and the same kind of watermark image may be used for consecutive frames.
  • the test image shown in FIG. 3 a, is 512 ⁇ 512 “baboon” and in FIG. 5 a is a 512 ⁇ 512 “Lenna”, and the watermark image is a 64 ⁇ 64 binary image shown in FIG. 2 a, with each bit to be embedded into the corresponding 8 ⁇ 8 image block.
  • the visual-model-based watermark encoding scheme the image is first divided into 8 ⁇ 8 blocks. Then each block is discrete cosine transformed (DCT).
  • DCT discrete cosine transformed
  • JND Just Noticeable Distortion
  • a meaningful signature S 0 for example “SLA”, is mapped to an i.i.d. sequence S 1 with distribution of N(0, 1). S 1 is then modulated by the original watermark image and G i (.), and then embedded into the original image according to Eq. (3).
  • the signature S 0 is presented as the secret key, and S 2i is chosen as B i S 1i , which has been shown to be a near optimal choice.
  • the feature set ⁇ X i ⁇ consists of DCT/wavelet coefficients, excluding DC/lowest subband coefficient, which are larger than their corresponding B i .
  • DCT/wavelet coefficients excluding DC/lowest subband coefficient, which are larger than their corresponding B i .
  • FIG. 3 b depicts the watermarked “baboon” images.
  • FIGS. 3 a and 3 b appear to be the same. No visual difference is observed.
  • the visual model based watermark encoder is doing a good job. Different resolutions of the binary watermark image from the test image under different channel conditions are extracted and shown in FIG. 4. When the watermarked “baboon” image does not suffer from any signal processing, the extracted versions with different detection windows are shown in FIG. 4. Several detection window sizes are used in the extraction process. In FIG. 4 a, only the current image block is used. In FIG. 4 b, five image blocks are used, including the current block, the ones above, below, to the left, and to the right. In FIG.
  • FIG. 4 c a 3 ⁇ 3 window of blocks are used, and in FIG. 4 d, a 5 ⁇ 5 windows of blocks are used. It is seen that FIG. 4 a and FIG. 4 b provide the best resolution of the binary watermark image. There is some random noise presented in the extracted images. The noise is easily filtered out by human eye. It should be noted that if one increases the segment size for embedding one information bit in the encoding stage (in order to provide an identifier that is robust to signal processing), no such detailed information may be embedded and later extracted.
  • FIG. 6 shows the extracted watermark images from the watermarked 512 ⁇ 512 “Lenna” image, sampled as in FIG. 4. These appear to be a little bit noisier than the corresponding results for “baboon” image. This suggests that different images may tolerate different amount of watermarks, and therefore the detection scheme should have some adaptability to account for the differing robustness.
  • FIG. 7 shows the extracted watermark images with different detection windows from the watermarked “baboon” image which suffers from JPEG compression with quality factor of 15%.
  • the extracted image in FIG. 6 a is hardly recognizable. It is better to present to a jury the results of FIG. 7 b or FIG. 7 c in which both “PU” and “EE” are still recognizable.
  • the extracted image is meaningless, see FIG. 8 a.
  • the extracted watermark image in FIG. 8 b is difficult to recognize too, while the extracted watermark images in FIG. 8 c and FIG. 8 d are recognizable (at least true for the larger characters “P” and “U”).
  • FIG. 9 depicts the robustness of the detection with quantitative measure scheme presented above to JPEG compression. Note that in this case, the ownership claimant will present both the signature S 0 and the original logo image, and the correlating signature ⁇ S 2i ⁇ should be ⁇ B i S 1i b i ⁇ where b i is the corresponding bit (+1 or ⁇ 1) of the original logo image. This is a valid correlating signature because it is still generated independent of any image.
  • the watermarking method presented has some potential applications in managing publicly available multimedia database. For example, it may be incorporated into a secure digital camera. It might also be in the interest of JPEG2000 (international standard for low bit rate still image coding) community.
  • JPEG2000 international standard for low bit rate still image coding

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

A method for embedding and extracting visually imperceptible indicia in an image includes embedding a visually imperceptible indicia in an original image; testing a test image for an embedded visually imperceptible indica; and extracting the visually imperceptible indicia from the test image to determine if the test image is a copy of the original image.

Description

    FIELD OF THE INVENTION
  • This invention relates to digital watermarking of multimedia data for copyright protection. [0001]
  • BACKGROUND OF THE INVENTION
  • Digital watermarking is a process of embedding information, sometimes referred to as a signature, directly into the media data by making small modifications to the data. The subsequent extraction of the signature from the watermarked media data may be used to identify the rightful owner, the intended recipients, and the authenticity of a media data. Because of the rapid growth of digital imagery, the increasingly easy access to digital media, and the availability of powerful digital image manipulation tools, media security has become an important issue. Digital watermarks have been proposed as a method for indicating copyright ownership of multimedia data. [0002]
  • There are two requirements for invisible watermarks: First, the watermarks should be perceptually invisible, i.e., they should not interfere with the media being protected; Second, the watermark should be sufficiently robust to defeat any attempt to eliminate the watermark, or to forge a fake watermark to establish a counterfeit ownership claim. They should also be sufficiently robust to withstand common signal processing. Particularly, a watermark should be detectable even if common signal processing operations have been applied to the watermarked image. [0003]
  • Early developments in digital watermarking concentrated on the first objective without considering the second, resulting in “invisible” watermarks which are easily circumvented. Recently, work has been devoted to designing robust watermarking schemes. Perceptual models have been incorporated to equalize watermark qualities of perceptual invisibility and robustness to signal processing. In some applications, it may be advantageous to exploit the human visual system's superior ability to recognize a correlated pattern. However, in the prior art, instead of directly extracting a watermark image, the superior recognition ability of the human visual system is only used to visualize some detection results. [0004]
  • Previous methods suffer from one or some of the following drawbacks. They are not generally robust to signal processing The watermarks are embedded to the visually least significant portion of an image. While this approach results in watermarked images with very good visual quality, the embedded watermark is generally vulnerable to signal processing, such as JPEG compression, lowpass filtering etc. [0005]
  • The original un-watermarked image is needed in the detection process. Some previous methods use the original un-watermarked image in the watermark detection process. Typically the watermark sequence may be first extracted by subtracting the original image data from the test (potentially watermarked) image data. While this generally increases the detection capability of the watermarking system, and is helpful for some applications, such as identifying an illegal distributor, it is not applicable to resolving rightful ownership claim. This is because the authenticity of the claimed “original” image is still questionable. An attacker may forge a fake “original” image and a fake watermark and come up with a counterfeit ownership claim. Requiring the watermark to be dependent on the “original” image in the hope that with this constraint the “original” image may not be generated after the fake watermarks does not necessarily resolve this problem, because an attacker still has the flexibility to manipulate the claimed “original” image to computationally search for an original-image-dependent fake watermark, which has certain correlation with the extracted watermarks. [0006]
  • The detector output is not immediately obvious to a jury. Some schemes embed some potentially registered numbers such as an owner ID, or image ID, similar to the ISBN # of a book. The physical meaning of the extracted bits has to be conveyed by an interpreter such as a central registration agent, or a technical expert in the court, which may not be straightforward to a jury. In addition, the number of bits that may be embedded and later reliably extracted depends on how severely the watermarked image has been processed. One has to determine the tradeoff between number of bits embedded and the robustness of the watermark to signal processing at the time of watermark insertion. A one bit error in the extracted bits may cause the whole ID number to be invalid. Some methods are known which embed a binary image, and hence are easier for a jury to understand, however, such techniques still have to use the original image in the watermark extraction process, thus are not applicable to resolving rightful ownership as discussed above. Furthermore, such methods do not allow the watermark detector to adaptively choose the trade-off between the degree of robustness and the resolution of the extracted watermark. [0007]
  • SUMMARY OF THE INVENTION
  • In this invention, a method to “visualize”, in an adaptive manner, the invisible watermarks for proving the ownership is described. A method which is capable of embedding a good resolution meaningful binary watermark image in an image and later extracting different versions of that watermark image with varying resolutions is proposed. The method has the nice feature that the watermark detector is allowed to adaptively choose the trade-off between robustness degree and resolution of the extracted watermark image. [0008]
  • A meaningful binary watermark image is embedded and extracted, which will greatly facilitate the process of convincing a jury of an ownership claim. While a statistical technique which may quantify the false alarm detection probability should be considered as a fundamental measure for a valid ownership claim, the ability to extract a meaningful watermark image, i.e., a logo, a registration number, or an image recognizable by a lay person, will greatly facilitate the process of convincing a jury of an ownership claim. A jury usually consists of non-technical people. The presentation of an extracted meaningful watermark image is much more convincing than a numerical value. [0009]
  • A method for embedding and extracting visually imperceptible indicia in an image includes embedding a visually imperceptible indicia in an original image; testing a test image for an embedded visually imperceptible indica; and extracting the visually imperceptible indicia from the test image to determine if the test image is a copy of the original image. The method may also include examining segments of varying sizes in the image at the decoder for detecting each bit of the embedded signature, and allows a user of the method of the invention to select trade-offs between resolution and detection performance, and to select an overall level of performance. [0010]
  • An object of the invention is to provide a valid, robust watermarking method which will facilitate the process of convincing a jury of an ownership claim. [0011]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1[0012] a is a block diagram for the watermark encoder used in the method of the invention.
  • FIG. 1[0013] b is a block diagram for the watermark detector used in the method of the invention.
  • FIG. 2[0014] a depicts a 64×64 binary watermark image to be embedded.
  • FIG. 2[0015] b depicts the extracted binary image when the test image does not contain the embedded watermark.
  • FIG. 3[0016] a depicts an original 512×512 “Baboon” image.
  • FIG. 3[0017] b depicts a watermarked “Baboon” image.
  • FIG. 4 depicts extracted watermark images from 512×512 watermarked “Baboon”. [0018]
  • FIG. 5[0019] a depicts an original 512×512 “Lenna” image.
  • FIG. 5[0020] b depicts a watermarked “Lenna” image.
  • FIG. 6 depicts extracted watermark images from 512×512 watermarked “Lenna”. [0021]
  • FIG. 7 depicts extracted watermark images from 512×512 watermarked “Baboon” with JPEG compression with quality factor of 15%. [0022]
  • FIG. 8 depicts extracted watermark images from 512×512 watermarked “Baboon” with JPEG compression with quality factor of 5%. [0023]
  • FIG. 9 is a graph showing output statistic q as a function of JPEG quality factor Q for 512×512 watermarked “Baboon”. [0024]
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
  • The method of the invention provides an opportunity to exploit the human visual system's (HVS) superior ability to recognize a correlated pattern. In this invention, a watermark decoder is allowed to directly extract a meaningful binary watermark image from the test image to prove image ownership. The human visual system's superior recognition ability is exploited to provide persuasive evidence of copyright ownership to a jury. The method is robust and will withstand common forms of signal processing. As used herein, “robust” means that there is a possibility of correct detection of each bit following signal processing, therefore, a more robust embedding/detection scheme has a higher probability that each bit will be correctly detected following signal processing. [0025]
  • The method allows extraction of multiresolution watermark images. Images may absorb various amount of watermark implantation without revealing visual artifacts. More importantly, the watermarked image may undergo different types of signal processing before it is input as the test image to the watermark detector. The watermarks may be treated as a signal to be transmitted, and the original image may be considered a transmission media. However, the channel capacity is variable, depending on the original image characteristics, and on the amount of signal processing applied to the watermarked image. Because channel capacity is unknown at the time of watermark insertion, it is difficult to determine how much information may be embedded and later reliably extracted at the watermark detector. [0026]
  • To survive the most severe channel conditions, i.e., noisy signal conditions, the embedded data rate should be low, therefore less information may be embedded. However, tailoring to the “worst case” is not desirable, because when the channel condition is good, the possibility of extracting more information to more effectively convincing a jury is sacrificed. In this approach, a good resolution binary watermark image is always embedded. However, the watermark detector has the flexibility of extracting watermark images at different resolutions. In other words, the detector has the capability to adapt to the channel conditions. When the channel condition is good, the detector extracts and present a good resolution watermark image, which definitely will convince a jury of a valid ownership claim. On the other hand, when the channel condition is bad, the detector may still be able to extract a coarse resolution watermark image, which hopefully will also convince a jury. [0027]
  • The method of the invention, which is capable of embedding a good resolution meaningful binary watermark image, one that will make sense to a jury, e.g. a logo image, in an image, and is later capable of extracting different versions of that watermark image with varying resolutions, is disclosed. The method of the invention adaptively chooses the trade-off between robustness and resolution of the extracted watermark image. While a statistical technique which may quantify the false alarm detection probability should be considered as a fundamental measure for a valid ownership claim, the ability to extract a meaningful watermark image will greatly facilitate the process of convincing a jury of an ownership claim. [0028]
  • FIG. 1[0029] a depicts the general architecture of a watermark encoder, generally at 10, using the method of the invention. An original image I, 12, is selected for watermarking. Image 12 may be transformed, in the preferred embodiment, step 14, into a transformed image having a set of features, Ii, in preparation for watermark embedding. Step 14, however, is not always required. A logo image {bi} 16, may be designated and prepared for embedding. A meaningful signature, or key, S0, 18, (e.g. an owner name or ID) is first mapped, using a one-way deterministic function H 20, to a single parameter which is then used as a seed of a standard random number generator to generate an independent identical distribution (i.i.d.) pseudo random sequence S1, denoted as {S1i}, which defines each point in the sequence. The requirement that the seed of the random number generator is derived from a meaningful signature or registration number, S0, eliminates the possibility of forging a watermark by manipulating the seed to search for a large detector output value, which indicates a low false alarm detection probability, as will be shown later herein.
  • [0030] Logo image 16 and key 18 are also referred to herein, collectively, as a visually imperceptible indicia, or watermark. Logo image 16 may be an actual logo, or other identifying indicia, selected by the copyright owner, that will be meaningful to a jury, i.e., a jury will immediately recognize logo image 16 as something that belongs to the copyright owner. Key 18 is generally an alpha-numeric, a registration number, such as an ISDN or copyright registration number. It is assumed that key 18 will always be used as the visually imperceptible idicia, while logo image 16 is an optional indicator of ownership.
  • The [0031] logo image 16 is modulated, step 22, with S1i, and, with perceptual model 24, which controls the magnitude of Gi(Ii), is inserted, step 26, into Ii, forming a watermarked image I′. The meaningful signature is, in the preferred embodiment, a 64×64 bit block, which, when projected on and inserted into a 512×512 image block provides one bit in every 8×8 block of the original image.
  • Note that if there is no constraint on the procedure for generating the seed of the random number generator, then an attacker can, by varying the seeds, thoroughly search for a random sequence that has good correlation with any given image. For example, given any test image, by varying the seed, on average, after 10[0032] 7 trials, the detector will output a value which is larger than 5 (see Table 1). Then the attacker may then assert that the test image contains his resulting seed.
  • Discussing first a scenario in which a claimed signature is to be detected using a quantitative measure, first assume that the logo image bits, {b[0033] i} 16, of FIG. 1a, are all “1”. The following describes how to detect the claimed signature S0, if the signature is embedded in the test image.
  • Given a set of features {I[0034] i}, derived from the original image I, the signature S1i is modulated by Gi(Ii), where Gi(.) could be a function of Ii, and then added to Ii. The encoding function E is illustrated in Eq. (1).
  • In the watermark detector, shown generally at [0035] 30 in FIG. 1b, the test image 32, X, is transformed, step 34, to yield a feature set {(i}. The random sequence {S1i} is first developed by subjecting S0 to H. Then a correlating signature {S2i} is generated based on {S1i} and the perceptual model 24. Xi is demodulated by S2i, under the control of perceptual model 24, to yield extracted watermarked bits 40, if present. S2i may be optimized, block 37, to improve detector performance. The correlator output q is compared to a threshold T to determine if the test image is a watermarked one. Detection of the watermarks is accomplished via the hypothesis testing:
  • H[0036] O: Xi=Ii+Ni not watermarked (0)
  • H[0037] 1: Xi=Ii+Gi(Ii)S1i+NI watermarked (1)
  • where N[0038] i is noise, possibly resulted from some signal processing such as JPEG compression, etc.. The correlating detector outputs the test statistic q q = i = 1 Y i V y n 1 / 2 = M y n 1 / 2 V y ( 2 )
    Figure US20010016058A1-20010823-M00001
  • where Y[0039] i=XiS2i, n is the size of the feature set {Xi}, My is the sample mean of Y i , V y 2
    Figure US20010016058A1-20010823-M00002
  • is the sample variance of Y[0040] i. V y 2 = i = 1 n ( Y i M y ) 2 n - 1 ( 3 ) M y = i = 1 n Y i n ( 4 )
    Figure US20010016058A1-20010823-M00003
  • Assume that the sequence {Y[0041] i} is stationary and at least 1-dependent (A sequence {Yi}is 1-dependent if (Y1, . . . , Yk) and (Yk+n, . . . , Yk+n+m) are independent whenever n>1), and that {S2i} is zero mean and un-correlated with the original image I. Then under H0 for large n, q is approximately a normal distribution with zero mean and unit variance, i.e., q˜N(0, 1).
  • Let E(.) denote the expectation operator. Under Hypothesis H[0042] 1 and for large n, it is easy to show that q follows a normal distribution N(m, 1), where m = i = 1 n ( G i ( I i ) S 1 i S 2 i + N i S 2 i ) V y n 1 / 2 = ( E ( G i ( I i ) S 1 i S 2 i ) + E ( N i S 2 i ) ) n 1 / 2 V y ( 5 )
    Figure US20010016058A1-20010823-M00004
  • Note that E(N[0043] iS2i) may not be equal to zero, since Ni could have some correlation with S2i. For example, if the feature points are some DCT coefficients, then the noise introduced by zeroing out some of the coefficients (due to, e.g., coarse quantization) is highly correlated with S1i, and thus may potentially have high correlation with S2i.
  • To determine if a test image contains the claimed watermarks, the output q is compared to a threshold T. If q>T, the test image is declared to have been signed with the claimed signature {S[0044] 1i}. Otherwise it is not. The threshold T that minimizes the total detection errors (both Type 1 error—accept the existence of a signature under H0, and Type 2 error—reject the existence of a signature under H1) is T=m/2. In practice, however, nobody other than the true owner knows the value of m. People may only care about the false alarm detection probability, that is, the probability of error detection by accepting the existence of a signature when it does not exist. Table 1 depicts the false alarm detection probability as a function of the threshold T.
    Threshold T Perr(q > T)
     3 0.0013
     5 2.86 E-7
     6 9.86 E-10
     8 6.22 E-16
    10 7.62 E-24
    12 1.77 E-33
  • Table 1: False alarm detection probability P[0045] err for the watermarking method presented
  • For a valid owndership claim, a valid correlating signature S[0046] 2 should satisfy certain constraints. First, it should be un-correlated with the original image I. Second, it is necessary that the mean value of S2i be zero. If Gi(.) is independent of Ii, then the choice of S2i =Gi S1i is the optimal correlating signature which will result in the largest mean value m under H1. On the other hand, if Gi(.) is a function of Ii, and assuming that Gi(.) may be written as a product of two terms, i.e., Gi(Ii)=Ui(Ii)Wi is independent of Ii, then a good choice of S2i is S1i Wi.
  • It should be noted that setting S[0047] 2i to Gi(Ii)S1i is generally not a good choice. In fact, {Gi(Ii)S1i} is not a valid correlating signature, because it depends on the original image I. Details of the analysis of selecting S2i may be found in W. Zeng and B. Liu, “An invisible watermark detection technique without using original images for resolving rightful ownership of digital images,” submitted to IEEE Tran. Image Processing, August 1997.
  • The scheme described above makes any counterfeit scheme virtually impossible, and the watermark detector output value truly quantifies the false alarm detection probability. However, the physical meaning of the detector output value may not be understood by a jury without the aid of expert testimony. In addition to the detector output value, which quantifies the false alarm detection probability, one may extract a meaningful watermark image (e.g., a logo image) from the test image, it will greatly facilitate the process of convincing a jury of an ownership claim. [0048]
  • Extraction of multiresolution binary watermark images [0049]
  • The scheme presented above essentially extracts one bit information from the entire test image X, i.e., whether the claimed signature [0050] 18 (S0) is embedded in the test image or not. One may embed/extract more bits by segmenting the whole image into smaller segments, that may or may not overlap, and then embed/extract one bit for each segment. A segment may be defined as a collection of data located in various parts of the image. Once the pseudo random sequence S1 is generated and divided into smaller segments, each of which corresponds to one segment of the original feature set {Ii}, each segment of S1 may be modulated by either +1 or −1, which is then embedded into the corresponding segment of {Ii}. Detection of this one bit information for a particular segment is accomplished via the hypothesis testing:
  • H[0051] 0′: Xi=Ii+Gi(Ii)S1i+Ni a bit of +1 is embedded (6)
  • H[0052] 1′: Xi=Ii−Gi(Ii)S1i+Ni a bit of −1 is embedded (7)
  • where N[0053] i is noise, and index i corresponds to data in one particular segment. Using the test statistic q as shown in Eq. (2), and assuming that {S2i}, is zero mean and un-correlated with the original image I, q follows normal distribution N(m, 1) and N(−m, 1) for H0′ and H1′ respectively, with m defined in Eq. 5. Therefore, the threshold that minimizes the total detection error is T=0. In other words, when q (or equivalently Σi=1 n Xi S2i) is greater than 0, a bit +1 is extracted; otherwise, a bit −1 is extracted. To minimize the detection errors, S2 is selected to maximize m. If Gi(.) is independent of Ii, then the optimal choice of S2i is Gi S1i. On the other hand, if Gi(.) is a function of Ii, and assuming that Gi(.) may be written as a product of two terms, i.e., Gi(Ii)=Ui(Ii) Wi, where Wi is independent of Ii, then S1i Wi is a good choice for S2i. Again, setting S2i to Gi (Ii) S1i is generally not a good choice.
  • To be most effective, the method should embed a meaningful binary watermark image. While a large detector output value, which quantifies the false alarm detection probability, should be considered as the fundamental measure for a valid ownership claim, the ability to extract a meaningful watermark image is very useful in convincing a jury of the claim of ownership. The extracted watermark image serves as a visual measure of the “invisible” watermarks embedded in the test image. It has an additional advantage of exploiting the human visual system's superior ability to recognize a correlated pattern. It is well known that, unlike traditional data, visual data may be “lossy”, and less sensitive to detection errors. Human eyes easily filter out random noise and recognize a correlated pattern, in a way similar to how channel coding detects and corrects transmission errors. Another advantage is that visual data usually has high spatial correlation. This property may be used to enhance the detection performance, and will now be described. [0054]
  • It may be seen from Eq. (5) that the larger the size, n, of each segment, the larger the value of m, and hence the smaller the detection error. However, increasing the size of each segment reduces the total number of bits that may be embedded. As a result, the prospective binary watermark image to be embedded has more constraints and less flexibility. Instead of enlarging the segment, the method of the invention embeds one bit to each small, say, 8×8, image block. [0055]
  • At the detector, one may usually correctly extract one bit from each 8×8 test image block, if the watermarked image does not suffer from much image processing. However, if the watermarked image does undergo some image processing, the bit will not be extracted reliably and the detection error will increase. In this case, the method exploits the spatial correlation of the binary watermark image to improve detection performance. [0056]
  • Referring now to FIG. 2[0057] c, the number of image segments from which one bit will be extracted is increased by looking also at surrounding, or adjacent, segments, a, rather than just the current segment, c. Note again at the encoder, each watermark bit is embedded in a small block such as an 8×8 block, and at the decoder the image is still first segmented into 8×8 blocks. However, at the decoder, the segments associated with neighboring bits, a, are used to detect the current bit. For example, to extract the bit embedded in the current 8×8 image block, c, the surrounding image blocks, a, may also be used. In other words, calculate i = 1 n X i S 2 i ,
    Figure US20010016058A1-20010823-M00005
  • where n′ is the total number of features within the detection window, and then compare the result to zero to determine the embedded bit of the current block. Note that if the test image X does contain the watermark image, then [0058] i = 1 n X i S 2 i = i = 1 n ( I i + N i ) S 2 i + i = 1 n b i G i ( I i ) S 1 i S 2 i ,
    Figure US20010016058A1-20010823-M00006
  • where b[0059] i is the corresponding bit (+1/−1) embedded in a particular 8×8 block. The second term accumulates and is the major factor to determine the embedded bit. A bit in a homogenous region of the watermark image usually has the same value as the surrounding bits. Thus by increasing the number of neighboring blocks involved in extracting one bit information embedded in the current block, i = 1 n b i G i ( I i ) S 1 i S 2 i
    Figure US20010016058A1-20010823-M00007
  • is increased, thus reducing the detection error. However, for information bits around an edge in the binary watermark image, increasing the window size may not necessarily reduce the detection error, because the b[0060] i embedded in other blocks may not have the same sign as the bi embedded in the current block. Therefore the extracted binary watermark image may lose its resolution around edges, even though it is more robust to signal processing in the homogenous region. The trade-off here is robustness of detection of each bit vs. resolution of extracted watermark image. An important feature of the method of the invention is that the watermark detector is allowed to adaptively choose the trade-off between robustness and resolution. The use of a larger number of segments for detection of a single, or current, bit tends to eliminate noise and increase robustness, except at the edges of the image.
  • When the test image does not suffer from signal processing, a small detection window. i.e., a relatively small number of segments, generally having 8×8 or more bits per segment, is chosen and a good resolution watermark image will be extracted. On the other hand, when the test image suffers from severe image processing, robustness is a concern and the number of segments involved for detecting each bit should be increased. In this case, by increasing the detection window size, a coarse resolution watermark image may be extracted. It should be noted that increasing the detection window size to increase the robustness is different from applying some noise-reduction operations, such as media filtering, to the extracted watermark image obtained by using only one block in the bit extraction process. In the latter case, each bit is detected independently first, and each is more vulnerable to channel noise. Once enough bits are in error, rendering an unrecognizable extracted image, no noise-reduction operation may recover a recognizable pattern. However, increasing the detection window may still extract a meaningful pattern, as shown in FIG. 7. [0061]
  • It should also be noted that the computation overhead for extracting multiresolution watermark images instead of a single watermark image is very small, because the same multiplication operations are shared and only a few additions are needed when the detection window size is increased. For video watermarking, the same binary watermark image may be embedded in a group of frames. Since the detection window now has one more dimension, the embedded watermark image is much more robust. However, a single frame is subject to the attack of trying to eliminate the watermarks by doing some sort of averaging from the neighboring frames. In other words, the capability of extracting the watermark image from a single test frame may be adversely affected. To overcome this problem, the same random sequence and the same kind of watermark image may be used for consecutive frames. [0062]
  • Starting with a visual-model-based watermark encoding scheme, and applying the detection scheme of the invention to extract the binary watermark image, the method of the invention will be described in relation to test results. The test image, shown in FIG. 3[0063] a, is 512× 512 “baboon” and in FIG. 5a is a 512×512 “Lenna”, and the watermark image is a 64×64 binary image shown in FIG. 2a, with each bit to be embedded into the corresponding 8×8 image block. In the visual-model-based watermark encoding scheme, the image is first divided into 8×8 blocks. Then each block is discrete cosine transformed (DCT). The Just Noticeable Distortion (JND) is then derived for each coefficient Ii as BiC(Ii), where Bi is half of the optimized image-independent perceptually lossless quantization step size for each coefficient (or frequency), and C(.), which is not less than 1, is an increasing function of Ii which accounts for the contrast masking effect of human visual system. The feature set {Ii} consists of the DCT or wavelet coefficients, excluding DC/lowest subband coefficient, which are larger than the corresponding JNDs, and BiC(Ii) is used as Gi(.) in the watermark insertion process illustrated by Eq. (7). A meaningful signature S0, for example “SLA”, is mapped to an i.i.d. sequence S1 with distribution of N(0, 1). S1 is then modulated by the original watermark image and Gi(.), and then embedded into the original image according to Eq. (3). In the watermark detector, the signature S0 is presented as the secret key, and S2i is chosen as BiS1i, which has been shown to be a near optimal choice.
  • As mentioned above, the feature set {X[0064] i} consists of DCT/wavelet coefficients, excluding DC/lowest subband coefficient, which are larger than their corresponding Bi. For synchronization between encoder and decoder, we will use the same seed to generate a random sequence, each element of which corresponding to one coefficient. But only those elements corresponding to feature points will be used in the detection.
  • FIG. 3[0065] b depicts the watermarked “baboon” images. FIGS. 3a and 3 b appear to be the same. No visual difference is observed. The visual model based watermark encoder is doing a good job. Different resolutions of the binary watermark image from the test image under different channel conditions are extracted and shown in FIG. 4. When the watermarked “baboon” image does not suffer from any signal processing, the extracted versions with different detection windows are shown in FIG. 4. Several detection window sizes are used in the extraction process. In FIG. 4a, only the current image block is used. In FIG. 4b, five image blocks are used, including the current block, the ones above, below, to the left, and to the right. In FIG. 4c, a 3×3 window of blocks are used, and in FIG. 4d, a 5×5 windows of blocks are used. It is seen that FIG. 4a and FIG. 4b provide the best resolution of the binary watermark image. There is some random noise presented in the extracted images. The noise is easily filtered out by human eye. It should be noted that if one increases the segment size for embedding one information bit in the encoding stage (in order to provide an identifier that is robust to signal processing), no such detailed information may be embedded and later extracted.
  • As the detection window size increases, lower resolution watermark images are extracted in which the edge parts become more and more jerky (see, e.g., the character “[0066] 7” in FIG. 4d). Hence when the channel condition is good, the extracted good resolution watermark image of FIG. 4a or FIG. 4b may be presented to a jury to prove the ownership. Note that, since S2 is generated independent of the test image, if the test image does not contain the claimed watermarks, the extracted binary image will look rather random, as shown in FIG. 2b. FIG. 6 shows the extracted watermark images from the watermarked 512×512 “Lenna” image, sampled as in FIG. 4. These appear to be a little bit noisier than the corresponding results for “baboon” image. This suggests that different images may tolerate different amount of watermarks, and therefore the detection scheme should have some adaptability to account for the differing robustness.
  • When the watermarked image is subject to signal processing such as JPEG compression, the resolution of the extracted binary watermark image has to be traded for robustness. FIG. 7 shows the extracted watermark images with different detection windows from the watermarked “baboon” image which suffers from JPEG compression with quality factor of 15%. The extracted image in FIG. 6[0067] a is hardly recognizable. It is better to present to a jury the results of FIG. 7b or FIG. 7c in which both “PU” and “EE” are still recognizable.
  • When the JPEG compression quality factor is 5%, the extracted image is meaningless, see FIG. 8[0068] a. The extracted watermark image in FIG. 8b is difficult to recognize too, while the extracted watermark images in FIG. 8c and FIG. 8d are recognizable (at least true for the larger characters “P” and “U”). Note that it might be helpful to construct the binary watermark image in a way such that the content has some hierarchical structure, e.g., for identification of a hierarchical organization, or the IDs for contributors who make varying contributions to a composite image, and that higher level content consists of more redundant bits. It should also be noted that if the detection with quantitative measure method presented above is used to detect the watermark in the JPEG compressed watermarked “baboon” image (with quality factor of 5%), then the detector outputs a value of 21 which virtually corresponds to zero false alarm detection probability. Table 1 sets forth the false alarm detection probability with respect to the detector output value.
  • FIG. 9 depicts the robustness of the detection with quantitative measure scheme presented above to JPEG compression. Note that in this case, the ownership claimant will present both the signature S[0069] 0 and the original logo image, and the correlating signature {S2i} should be {BiS1ibi} where bi is the corresponding bit (+1 or −1) of the original logo image. This is a valid correlating signature because it is still generated independent of any image.
  • It should be noted that there might be cases in which the extracted watermark images are hardly recognizable despite the detection window size used, while the detector output value of the detection with quantitative measure method presented above is still large enough to signify a low false alarm detection probability. This again suggests that the quantitative measure method presented above provides, in the view of technical experts, a fundamental measure for a valid ownership claim. However, the watermarking method of this invention makes more sense to ordinary people, thus will greatly facilitate the process of convincing a jury of an ownership claim. Only when the watermarked image has been subject to too much processing, resulting in unrecognizable extracted watermark images despite the detection window size used, should it be necessary to call the technical expert to testify the physical meaning of the output value of the detection with quantitative measure watermarking method described above. [0070]
  • The watermarking method presented has some potential applications in managing publicly available multimedia database. For example, it may be incorporated into a secure digital camera. It might also be in the interest of JPEG2000 (international standard for low bit rate still image coding) community. [0071]
  • Although a preferred embodiment of the invention, and variations thereof, have been disclosed, it will be appreciated that further modifications and variations thereto may be made within the scope of the invention as defmed in the appended claims. [0072]

Claims (20)

I claim:
1. A method for embedding and extracting visually imperceptible indicia in an image, comprising:
embedding a visually imperceptible indicia in an original image;
testing a test image for an embedded visually imperceptible indica; and
extracting the visually imperceptible indicia from the test image to determine if the test image is a copy of the original image.
2. The method of
claim 1
wherein said embedding includes:
designating a visually imperceptible indicia to be embedded in an original image;
selecting a key S0;
generating a pseudo random sequence Si from the key S0;
modulating the visually imperceptible indicia by the pseudo random sequence to develop a signature; and
inserting the signature into the original image.
3. The method of
claim 2
wherein said generating includes mapping S0, using a one-way deterministic function H, to a single parameter and using the single parameter as a seed to generate an independent identical distribution pseudo random sequence.
4. The method of
claim 2
wherein said designating includes designating a one-bit visually imperceptible indicia and wherein said inserting includes implanting a single indicia in the original image.
5. The method of
claim 2
wherein said designating includes designating multiple one-bit indicia and wherein said inserting includes dividing the original image into segments and placing a one-bit visually imperceptible indicia into each segment.
6. The method of
claim 1
wherein said extracting includes demodulating an image feature set by a pseudo random sequence to determine the presence of the designated visually imperceptible indicia.
7. The method of
claim 1
wherein said testing includes:
transforming a test image X into an image feature set Xi;
developing a random sequence S1i by subjecting a key S0 to a one-way deterministic function H;
generating a correlating signature S2i from S1i and a perceptual model; and
comparing the correlating output to a threshold value to determine the presence of a watermark.
8. The method of
claim 1
wherein said embedding includes transforming the original image I into a transformed image Ii.
9. The method of
claim 1
wherein said embedding and said extracting include dividing an image into segments.
10. The method of
claim 9
wherein said extracting includes making use of different number of segments associated with neighboring watermark bits to detect the current bit, for an image that has been subject to different levels of signal processing.
11. The method of
claim 1
wherein said embedding a visually imperceptible image includes embedding a logo image {bi} and embedding a signature S0.
12. The method of
claim 1
wherein said extracting a visually imperceptible image includes extracting a logo image {bi} and extracting a signature S0.
13. A method for embedding and extracting visually imperceptible indicia in an image, comprising:
embedding a visually imperceptible indicia in an original image, including
designating a logo image to be embedded in an original image;
selecting a signature S0;
generating a pseudo random sequence S1 from the signature S0, including
mapping S0, using a one-way deterministic function H, to a single parameter and using the single parameter as a seed to generate an independent identical distribution pseudo random sequence;
modulating the logo image by the pseudo random sequence to develop a visually imperceptable indicia; and
inserting the visually imperceptable indicia into the original image;
testing a test image for an embedded visually imperceptible indica; and
extracting the visually imperceptible indicia from the test image to determine if the test image is a copy of the original image.
14. The method of
claim 13
wherein said designating includes designating a one-bit visually imperceptible indicia and wherein said inserting includes implanting a single indicia in the original image.
15. The method of
claim 13
wherein said designating includes designating multiple one-bit indicia; wherein said embedding and said extracting include dividing an image into segments and wherein said inserting includes placing a one-bit visually imperceptible indicia into each segment.
16. The method of
claim 13
wherein said extracting includes making use of different number of segments associated with neighboring visually impeceptible indicia-bearing bits to detect the current bit, for an image that has been subject to different levels of signal processing.
17. The method of
claim 13
wherein said extracting includes demodulating an image feature set by a pseudo random sequence to determine the presence of the designated visually imperceptible indicia.
18. The method of
claim 13
wherein said testing includes:
transforming a test image X into an image feature set Xi;
developing a random sequence S1i by subjecting a signature S0 to a one-way deterministic function H;
generating a correlating signature S2i from S1i and a perceptual model; and
comparing the correlating output to a threshold value to determine the presence of a signature.
19. The method of
claim 18
which includes comparing the correlating output to a threshold value to determine the presence of a watermark.
20. The method of
claim 13
wherein said embedding includes transforming the original image I into a transformed image Ii.
US09/164,231 1998-03-16 1998-09-30 Method for extracting multiresolution watermark images to determine rightful ownership Expired - Lifetime US6373974B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US09/164,231 US6373974B2 (en) 1998-03-16 1998-09-30 Method for extracting multiresolution watermark images to determine rightful ownership

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US7822498P 1998-03-16 1998-03-16
US09/164,231 US6373974B2 (en) 1998-03-16 1998-09-30 Method for extracting multiresolution watermark images to determine rightful ownership

Publications (2)

Publication Number Publication Date
US20010016058A1 true US20010016058A1 (en) 2001-08-23
US6373974B2 US6373974B2 (en) 2002-04-16

Family

ID=26760258

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/164,231 Expired - Lifetime US6373974B2 (en) 1998-03-16 1998-09-30 Method for extracting multiresolution watermark images to determine rightful ownership

Country Status (1)

Country Link
US (1) US6373974B2 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010034835A1 (en) * 2000-02-29 2001-10-25 Smith Robert E. Applied digital and physical signatures over telecommunications media
US20030053657A1 (en) * 2001-09-13 2003-03-20 Canon Kabushiki Kaisha Insertion of a message in a sequence of digital images
US20060110005A1 (en) * 2004-11-01 2006-05-25 Sony United Kingdom Limited Encoding apparatus and method
US7328847B1 (en) * 2003-07-30 2008-02-12 Hewlett-Packard Development Company, L.P. Barcode data communication methods, barcode embedding methods, and barcode systems
US20080267515A1 (en) * 2004-09-28 2008-10-30 Xerox Corporation Encoding invisible electronic information in a printed document
US7634089B1 (en) * 1999-10-29 2009-12-15 Sarnoff Corporation Cinema anti-piracy measures
US20170249339A1 (en) * 2016-02-25 2017-08-31 Shutterstock, Inc. Selected image subset based search
US10740385B1 (en) 2016-04-21 2020-08-11 Shutterstock, Inc. Identifying visual portions of visual media files responsive to search queries

Families Citing this family (58)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7644282B2 (en) 1998-05-28 2010-01-05 Verance Corporation Pre-processed information embedding system
US6944313B1 (en) * 1998-08-06 2005-09-13 Canon Kabushiki Kaisha Method and device for inserting and decoding a watermark in digital data
US6704431B1 (en) 1998-09-04 2004-03-09 Nippon Telegraph And Telephone Corporation Method and apparatus for digital watermarking
FR2785426B1 (en) * 1998-10-30 2001-01-26 Canon Kk METHOD AND DEVICE FOR INSERTING AND DETECTING A MARK IN DIGITAL DATA
US20040039912A1 (en) * 1999-02-26 2004-02-26 Bitwise Designs, Inc. To Authentidate Holding Corp. Computer networked system and method of digital file management and authentication
DE60029567T2 (en) * 1999-02-26 2007-09-20 Authentidate Holding Corp. DIGITAL DATA MANAGEMENT AND IMAGE MANUFACTURING SYSTEM AND METHOD WITH SECURED DATA MARKING
JP3098513B1 (en) * 1999-04-14 2000-10-16 インターナショナル・ビジネス・マシーンズ・コーポレ−ション Modification determination device and method
US6901514B1 (en) * 1999-06-01 2005-05-31 Digital Video Express, L.P. Secure oblivious watermarking using key-dependent mapping functions
TW451171B (en) * 1999-07-16 2001-08-21 Cyberlink Corp A method to embed and extract hidden digital watermark
US6654479B1 (en) * 1999-08-19 2003-11-25 Academia Sinica Cocktail watermarking on images
US6792129B1 (en) * 1999-08-25 2004-09-14 Sharp Laboratories Of America Digital watermarking in a perceptually uniform domain
US7340499B1 (en) * 1999-12-03 2008-03-04 Sun Microsystems, Inc. Dynamic embedding of literal object data in supplied instance of information object
FR2803676A1 (en) * 2000-01-11 2001-07-13 Canon Kk DETERMINING A SEGMENTATION OF A DIGITAL SIGNAL TO INSERT MARKING SIGNALS AND ASSOCIATED INSERTION
US6385329B1 (en) * 2000-02-14 2002-05-07 Digimarc Corporation Wavelet domain watermarks
US6737957B1 (en) 2000-02-16 2004-05-18 Verance Corporation Remote control signaling using audio watermarks
US6724913B1 (en) * 2000-09-21 2004-04-20 Wen-Hsing Hsu Digital watermarking
US20040064416A1 (en) * 2000-10-03 2004-04-01 Ariel Peled Secure distribution of digital content
US6549675B2 (en) * 2000-12-20 2003-04-15 Motorola, Inc. Compression of digital ink
JP2002325170A (en) * 2001-04-24 2002-11-08 Canon Inc Image processing unit and its method, and program code, storage medium
WO2003021476A1 (en) * 2001-08-31 2003-03-13 Trac Medical Solutions, Inc. System for interactive processing of form documents
US6782116B1 (en) * 2002-11-04 2004-08-24 Mediasec Technologies, Gmbh Apparatus and methods for improving detection of watermarks in content that has undergone a lossy transformation
US8601504B2 (en) * 2002-06-20 2013-12-03 Verance Corporation Secure tracking system and method for video program content
US7190806B2 (en) * 2002-08-30 2007-03-13 Hewlett-Packard Development Company, L.P. System and method for data encryption/decryption
US20040042634A1 (en) * 2002-08-30 2004-03-04 Cazier Robert P. Referencing information in an image
US7218785B2 (en) * 2002-10-09 2007-05-15 Xerox Corporation Systems for spectral multiplexing of source images to provide a composite image, for rendering the composite image, and for spectral demultiplexing of the composite image
JP2006504986A (en) 2002-10-15 2006-02-09 ベランス・コーポレイション Media monitoring, management and information system
JP2004221633A (en) * 2003-01-09 2004-08-05 Ricoh Co Ltd Image processing apparatus, image processing program, and storage medium
DE10311634A1 (en) * 2003-03-14 2004-09-30 Authentidate International Ag Electronic transmission of documents
GB2404296A (en) * 2003-07-23 2005-01-26 Sony Uk Ltd Data content identification using watermarks as distinct codes
US7257234B2 (en) * 2003-08-14 2007-08-14 Microsoft Corporation Watermark-based goods authentication
US7369677B2 (en) 2005-04-26 2008-05-06 Verance Corporation System reactions to the detection of embedded watermarks in a digital host content
US20060239501A1 (en) 2005-04-26 2006-10-26 Verance Corporation Security enhancements of digital watermarks for multi-media content
US9055239B2 (en) * 2003-10-08 2015-06-09 Verance Corporation Signal continuity assessment using embedded watermarks
US7616776B2 (en) 2005-04-26 2009-11-10 Verance Corproation Methods and apparatus for enhancing the robustness of watermark extraction from digital host content
US8020004B2 (en) 2005-07-01 2011-09-13 Verance Corporation Forensic marking using a common customization function
US8781967B2 (en) 2005-07-07 2014-07-15 Verance Corporation Watermarking in an encrypted domain
EP1966796A2 (en) * 2005-12-22 2008-09-10 Koninklijke Philips Electronics N.V. Efficient secure forensic watermarking
US8315424B2 (en) * 2007-03-19 2012-11-20 Ricoh Company, Ltd. Image processing apparatus, image processing method, and program product
US7884734B2 (en) * 2008-01-31 2011-02-08 Microsoft Corporation Unique identification of devices using color detection
US8259938B2 (en) 2008-06-24 2012-09-04 Verance Corporation Efficient and secure forensic marking in compressed
US8838977B2 (en) 2010-09-16 2014-09-16 Verance Corporation Watermark extraction and content screening in a networked environment
FR2973540B1 (en) * 2011-04-01 2013-03-29 CVDM Solutions METHOD FOR AUTOMATED EXTRACTION OF A PLANOGRAM FROM LINEAR IMAGES
US8615104B2 (en) 2011-11-03 2013-12-24 Verance Corporation Watermark extraction based on tentative watermarks
US8923548B2 (en) 2011-11-03 2014-12-30 Verance Corporation Extraction of embedded watermarks from a host content using a plurality of tentative watermarks
US8533481B2 (en) 2011-11-03 2013-09-10 Verance Corporation Extraction of embedded watermarks from a host content based on extrapolation techniques
US8682026B2 (en) 2011-11-03 2014-03-25 Verance Corporation Efficient extraction of embedded watermarks in the presence of host content distortions
US8745403B2 (en) 2011-11-23 2014-06-03 Verance Corporation Enhanced content management based on watermark extraction records
US9547753B2 (en) 2011-12-13 2017-01-17 Verance Corporation Coordinated watermarking
US9323902B2 (en) 2011-12-13 2016-04-26 Verance Corporation Conditional access using embedded watermarks
US9571606B2 (en) 2012-08-31 2017-02-14 Verance Corporation Social media viewing system
US8869222B2 (en) 2012-09-13 2014-10-21 Verance Corporation Second screen content
US20140075469A1 (en) 2012-09-13 2014-03-13 Verance Corporation Content distribution including advertisements
US8726304B2 (en) 2012-09-13 2014-05-13 Verance Corporation Time varying evaluation of multimedia content
WO2014153199A1 (en) 2013-03-14 2014-09-25 Verance Corporation Transactional video marking system
US9245310B2 (en) * 2013-03-15 2016-01-26 Qumu Corporation Content watermarking
US9251549B2 (en) 2013-07-23 2016-02-02 Verance Corporation Watermark extractor enhancements based on payload ranking
US9208334B2 (en) 2013-10-25 2015-12-08 Verance Corporation Content management using multiple abstraction layers
CN106170988A (en) 2014-03-13 2016-11-30 凡瑞斯公司 The interactive content using embedded code obtains

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5636292C1 (en) 1995-05-08 2002-06-18 Digimarc Corp Steganography methods employing embedded calibration data
US5862260A (en) * 1993-11-18 1999-01-19 Digimarc Corporation Methods for surveying dissemination of proprietary empirical data
CN100452071C (en) * 1995-02-13 2009-01-14 英特特拉斯特技术公司 Systems and methods for secure transaction management and electronic rights protection
US5659726A (en) 1995-02-23 1997-08-19 Sandford, Ii; Maxwell T. Data embedding
US5613004A (en) 1995-06-07 1997-03-18 The Dice Company Steganographic method and device

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7634089B1 (en) * 1999-10-29 2009-12-15 Sarnoff Corporation Cinema anti-piracy measures
US20010034835A1 (en) * 2000-02-29 2001-10-25 Smith Robert E. Applied digital and physical signatures over telecommunications media
US20030053657A1 (en) * 2001-09-13 2003-03-20 Canon Kabushiki Kaisha Insertion of a message in a sequence of digital images
US7386146B2 (en) * 2001-09-13 2008-06-10 Canon Kabushiki Kaisha Insertion of a message in a sequence of digital images
US7328847B1 (en) * 2003-07-30 2008-02-12 Hewlett-Packard Development Company, L.P. Barcode data communication methods, barcode embedding methods, and barcode systems
US20080267515A1 (en) * 2004-09-28 2008-10-30 Xerox Corporation Encoding invisible electronic information in a printed document
US7961905B2 (en) * 2004-09-28 2011-06-14 Xerox Corporation Encoding invisible electronic information in a printed document
US20060110005A1 (en) * 2004-11-01 2006-05-25 Sony United Kingdom Limited Encoding apparatus and method
US7792322B2 (en) * 2004-11-01 2010-09-07 Sony United Kingdom Limited Encoding apparatus and method
US20170249339A1 (en) * 2016-02-25 2017-08-31 Shutterstock, Inc. Selected image subset based search
US10740385B1 (en) 2016-04-21 2020-08-11 Shutterstock, Inc. Identifying visual portions of visual media files responsive to search queries

Also Published As

Publication number Publication date
US6373974B2 (en) 2002-04-16

Similar Documents

Publication Publication Date Title
US6373974B2 (en) Method for extracting multiresolution watermark images to determine rightful ownership
Nikolaidis et al. Robust image watermarking in the spatial domain
EP0766468B1 (en) Method and system for inserting a spread spectrum watermark into multimedia data
US6208735B1 (en) Secure spread spectrum watermarking for multimedia data
Voyatzis et al. Digital image watermarking using mixing systems
US8538068B2 (en) Embedding and detecting hidden information
US20040047489A1 (en) Apparatus and method for embedding and extracting a digital watermark based on a wavelet
EP1316917B1 (en) Apparatus and method for embedding watermark into original information, transmitting watermarked information, and reconstructing the watermark
Piva et al. Self recovery authentication of images in the DWT domain
Zebbiche et al. An efficient watermarking technique for the protection of fingerprint images
Rakhmawati et al. Blind Robust and Self-Embedding Fragile Image Watermarking for Image Authentication and Copyright Protection with Recovery Capability.
Baaziz Adaptive watermarking schemes based on a redundant contourlet transform
Kong et al. Object watermarks for digital images and video
Zeng et al. Extraction of multiresolution watermark images for resolving rightful ownership
Maity et al. An image watermarking scheme using HVS characteristics and spread transform
Mahmoud et al. Frequency domain watermarking: An overview.
Zhang et al. Embedding watermarks into both DC and AC components of DCT
D’Angelo et al. Watermark-based authentication
Lin et al. Image error concealment based on watermarking
Shrivastava et al. Survey of High Secure Digital Image Watermarking using Different Transform Technique
Kong et al. Statistic-based color image watermarking scheme in DWT domain
Caldelli et al. A new self-recovery technique for image authentication
Moon et al. DWT-based image watermarking for copyright protection
Nakai Semi fragile watermarking based on wavelet transform
Nguyen et al. Multireselution quantization-based image watermarking

Legal Events

Date Code Title Description
AS Assignment

Owner name: SHARP LABORATORIES OF AMERICA, INC, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ZENG, WENJUN;REEL/FRAME:009494/0693

Effective date: 19980917

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

FEPP Fee payment procedure

Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

AS Assignment

Owner name: SHARP KABUSHIKI KAISHA, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SHARP LABORATORIES OF AMERICA, INC.;REEL/FRAME:030952/0381

Effective date: 20130805

AS Assignment

Owner name: RAKUTEN, INC., JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SHARP KABUSHIKI KAISHA;REEL/FRAME:031179/0760

Effective date: 20130823

FPAY Fee payment

Year of fee payment: 12