US20020003879A1 - Data control method, method for embedding data control information, method for detecting data control information, device for embedding data control information, device for detecting data control information, and device for recording data - Google Patents

Data control method, method for embedding data control information, method for detecting data control information, device for embedding data control information, device for detecting data control information, and device for recording data Download PDF

Info

Publication number
US20020003879A1
US20020003879A1 US09/915,913 US91591301A US2002003879A1 US 20020003879 A1 US20020003879 A1 US 20020003879A1 US 91591301 A US91591301 A US 91591301A US 2002003879 A1 US2002003879 A1 US 2002003879A1
Authority
US
United States
Prior art keywords
data
information
permission
prohibition
embedding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US09/915,913
Other languages
English (en)
Inventor
Susumu Ibaraki
Noboru Katta
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Panasonic Holdings Corp
Original Assignee
Matsushita Electric Industrial Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Matsushita Electric Industrial Co Ltd filed Critical Matsushita Electric Industrial Co Ltd
Priority to US09/915,913 priority Critical patent/US20020003879A1/en
Publication of US20020003879A1 publication Critical patent/US20020003879A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00731Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
    • G11B20/00746Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0071Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00094Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
    • G11B20/00123Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers the record carrier being identified by recognising some of its unique characteristics, e.g. a unique defect pattern serving as a physical signature of the record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00166Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software
    • G11B20/00173Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software wherein the origin of the content is checked, e.g. determining whether the content has originally been retrieved from a legal disc copy or another trusted source
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00731Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
    • G11B20/00746Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
    • G11B20/00753Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags
    • G11B20/00768Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags wherein copy control information is used, e.g. for indicating whether a content may be copied freely, no more, once, or never, by setting CGMS, SCMS, or CCI flags
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0064Image watermarking for copy protection or copy management, e.g. CGMS, copy only once, one-time copy

Definitions

  • the present invention relates to a method for embedding data control information for controlling the permission or prohibition to copy recorded data in order to prevent data whose copyright should be protected (e.g., an audio software, a graphic software, or the like) from being copied or processed (i.e., manipulated), and a device for realizing the method; a method for detecting such data control information, and a device for realizing the method; and a data control method in which the method for embedding data control information and the method for detecting data control information are combined.
  • data whose copyright should be protected e.g., an audio software, a graphic software, or the like
  • n is an integer from 1 to 5.
  • brightness levels i.e. pixel information
  • Yai+d, Ybi ⁇ d i.e., (Yai+d, Ybi ⁇ d) or (Yai ⁇ d, Ybi+d)
  • the difference between these two points is calculated.
  • These processing steps are repeated n times, and a mean value of the thus-obtained differences is calculated. If the mean value is equal to or greater than d, the embedded bit is considered to be 1, and if the mean value is equal to or less than ⁇ d, the embedded bit is considered to be 0. If the mean value is between ⁇ d and d, it is considered that no information is embedded.
  • the expected value of (Yai ⁇ Ybi) is estimated to be 0.
  • the expected value of (Yai+d) ⁇ (Ybi ⁇ d) is 2d
  • the expected value of (Yai ⁇ d) ⁇ (Ybi+d) is ⁇ 2d. Accordingly, determination is performed assuming that the threshold values of displacement from the mean value of 0 are d and ⁇ d.
  • copy control information can be detected by finding the statistical distribution of such differences, and measuring the displacement of its variance from the estimated value.
  • the method for embedding copy control information and the method for detecting the copy control information are required not only to indicate the permission or prohibition to copy but also to control the number of allowed copies (e.g., to control the number of copies so as to limit the number of copies made to N).
  • the number of allowed copies e.g., to control the number of copies so as to limit the number of copies made to N.
  • a data control method includes the steps of: A) at least one of the following steps: A-1) embedding prohibition information in data, wherein copying of the data is to be prohibited; and A-2) embedding the prohibition information and N pieces of permission information in the data (N is a natural number), wherein the copying of the data is to be permitted N times; and B) detecting the prohibition and/or permission information prior to the copying of the data.
  • A-1) embedding prohibition information in data
  • A-2) embedding the prohibition information and N pieces of permission information in the data (N is a natural number), wherein the copying of the data is to be permitted N times
  • B) detecting the prohibition and/or permission information prior to the copying of the data In the case where the permission information is detected from the data prior to the copying of the data, at least one of the N pieces of permission information in the data is invalidated, and then the copying of the data is permitted. In the case where the permission information is not detected from the data, and the prohibition information is detected from the data prior
  • the permission information is a digital signature f(M); and the digital signature f(M) is derived based on a digital code M which is extracted from the data.
  • a method for embedding data control information includes one of the following steps of: embedding prohibition information in data, wherein copying of the data is to be prohibited; and embedding the prohibition information and N pieces of permission information in the data in the data (N is a natural number), wherein the copying of the data is to be permitted N times.
  • the permission information is a digital signature f(M) for a digital code M which is uniquely derived from the data.
  • a method for detecting data control information includes the step of detecting predetermined permission and/or prohibition information prior to copying of data.
  • the predetermined permission information is detected from the data prior to the copying of the data
  • the predetermined permission information is invalidated so as to permit the copying of the data.
  • the predetermined prohibition information is detected from the data prior to the copying of the data, the copying of the data is prohibited.
  • a method for detecting data control information includes the step of authenticating a digital signature f(M) in data based on a digital code M which is derived from data.
  • the digital signature f(M) in the data is authenticated prior to copying of the data, the copying of the data is permitted.
  • the digital signature f(M) in the data is not authenticated prior to the copying of the data, the copying of the data is prohibited.
  • a device for embedding data control information includes: a section for embedding prohibition information, which embeds prohibition information indicating at least a prohibition against copying of data in the data; and a section for embedding permission information, which embeds N pieces of permission information in the data along with the embedding of the prohibition information by the section for embedding prohibition information in the case where the copying of the data is to be permitted N times, wherein N is a natural number.
  • the section for embedding permission information has a code extracting section for extracting a digital code M from the data.
  • the section for embedding permission information includes: a signature section for generating a digital signature f(M) based on the digital code M which is extracted by the code extracting section and a first public key held by a producer of the data; and a signature embedding section for embedding the digital signature f(M) generated by the signature section in the data as the permission information.
  • a device for detecting data control information which extracts prohibition information and permission information embedded in data includes: a permission information detecting section for detecting the permission information from the data; a permission information invalidating section for invalidating the permission information in the data; a prohibition information detecting section for detecting the prohibition information from the data; and a determining section which sets a copy permission/prohibition flag to be in a copy permissive state and then outputs the flag in the case where the permission information is detected by the permissive information detecting section, and sets the copy permission/prohibition flag to be in a copy prohibited state and then outputs the flag in the case where the permission information is not detected by the permission information detecting section, and the prohibition information is detected by the prohibition information detecting section.
  • the permission information detecting section has a code extracting section for extracting a digital code M from the data.
  • the permission information detecting section includes: a signature extracting section for extracting a digital signature f(M) which is embedded in the data; and an authentication section which generates a digital signature f(M) based on the digital code M extracted by the code extracting section and a second public key, compares the generated digital signature f(M) with the digital signature f(M) extracted by the signature extracting section, and validates a copy permission flag and outputs the flag if the digital signature f(M) is authenticated.
  • a device for recording data on a recording medium includes: a permission information detecting section for detecting the permission information from the data; a permission information invalidating section for invalidating the permission information in the data; a prohibition information detecting section for detecting the prohibition information from the data; and a determining section which sets a copy permission/prohibition flag to be in a copy permissive state and then outputs the flag in the case where the permission information is detected by the permission information detecting section, and sets the copy permission/prohibition flag to be in a copy prohibited state and then outputs the flag in the case where the permission information is not detected by the permission information detecting section, and the prohibition information is detected by the prohibition information detecting section; and a data recording section which records the data in the case where the copy permission/prohibition flag is set to be in the copy permissive state by the determining section, and does not record the data in the case where the copy permission/prohibition flag is set to be in the copy prohibited state by the determining section
  • the permission information detecting section has a code extracting section for extracting a digital code M from the data.
  • a data control method includes the steps of: A) at least one of the following steps: A-1) embedding prohibition information in data, wherein processing of the data is to be prohibited; and A-2) embedding the prohibition information and N pieces of permission information in the data (N is a natural number), wherein the processing of the data is to be permitted N times; and B) detecting the permission and/or prohibition information prior to the processing of the data.
  • A-1) embedding prohibition information in data
  • A-2) embedding the prohibition information and N pieces of permission information in the data (N is a natural number), wherein the processing of the data is to be permitted N times
  • B) detecting the permission and/or prohibition information prior to the processing of the data In the case where the permission information is detected from the data prior to the processing of the data, at least one of the N pieces of permission information in the data is invalidated, and then the processing of the data is permitted. In the case where the permission information is not detected from the data, and the prohibition information is detected prior to the processing of the data, the processing of
  • a method for embedding data control information includes one of the following steps of: embedding prohibition information in data, wherein processing of the data is to be prohibited; and embedding the prohibition information and N pieces of permission information in the data (N is a natural number), wherein the processing of the data is to be permitted N times.
  • a method for detecting data control information includes the following step of: detecting predetermined permission and/or prohibition information prior to processing of data.
  • the predetermined permission information is detected from the data prior to the processing of the data
  • the predetermined permission information is invalidated so as to permit the processing of the data.
  • the predetermined prohibition information is detected from the data prior to the processing of the data, the processing of the data is prohibited.
  • a device for embedding data control information includes: a section for embedding prohibition information, which embeds prohibition information indicating prohibition against processing of data in the data; and a section for embedding permission information, which embeds N pieces of permission information in the data along with the embedding of the prohibition information by the section for embedding prohibition information in the case where the processing of the data is to be permitted N times, wherein N is a natural number.
  • a device for detecting data control information which extracts prohibition information and permission information embedded in data includes: a permission information detecting and deleting section which, in the case where N pieces of permission information (N is a natural number) are detected from the data, invalidates at least one of the N pieces of permission information in the data, validates a permission flag, and outputs the flag; a prohibition information detecting section which validates a prohibition flag and outputs the flag in the case where the prohibition information is detected from the data; and a determining section which sets a permission/prohibition flag to be in a permissive state and then outputs the flag when the permission flag is valid or the prohibition flag is not valid, and sets the permission/prohibition flag to be in a prohibited state and then outputs the flag when the permission flag is invalid and the prohibition information is valid.
  • the invention described herein makes possible the advantages of providing a method for embedding data control information which can control not only the permission or prohibition to copy, but also control the number of copies, and which makes it more difficult to conduct tampering, and a device for realizing the same; a method for detecting the data control information, and a device for realizing such a method; a method for embedding data control information which limits manipulation of data or data processing of displayed contents or the like, and a device for realizing such a method; and a method for detecting the data control information, and a device for realizing such a method.
  • FIGS. 1A to 1 D are views for describing the summary of a data control method according to Embodiment 1 of the present invention.
  • FIG. 2 is a flow chart showing a method for embedding data control information according to Embodiment 1 of the present invention
  • FIG. 3 is a flow chart showing a process in the method for embedding data control information shown in FIG. 2;
  • FIG. 4 is a flow chart showing a method for detecting data control information according to Embodiment 1 of the present invention.
  • FIG. 5 is a flow chart showing a process in the method for detecting data control information shown in FIG. 4;
  • FIG. 6 is a view for illustrating the structure of a data control system according to Embodiment 2 of the present invention.
  • FIG. 7 is a view for illustrating the structure of a method for embedding permission information in the data control system shown in FIG. 6;
  • FIG. 8 is a view for illustrating the structure of a method for detecting the permission information in the data control system shown in FIG. 6.
  • FIGS. 1A to 1 D are views for describing the summary of the data control method in Embodiment 1.
  • the term “data control” as used in Embodiment 1 of the present invention refers to copy control.
  • a signal CI is a signal dispersed over the entire image, and indicates copy prohibition information 31 (FIG. 1B).
  • a signal CE is a signal inserted in a predetermined position of the image, and indicates information 32 which permits the making of one copy (hereinafter, referred to as a “one-time-copy-permitting information”). In the case where copying is permitted N times, the number of permission information 32 inserted in the image is N.
  • the signal CI is dispersed over the entire image, and thus the signal CI is not visible.
  • the signal CE is inserted at a predetermined corner at the image, and the signal CE may be visible or invisible.
  • FIG. 1B shows an image 33 whose copying is prohibited (hereinafter, referred to as a “copy-prohibited image”).
  • FIG. 1C shows an image 34 whose copying is permitted once (hereinafter, referred to as a “one-time-copy-permitted image”).
  • a piece of the permission information 32 is inserted in the lower right corner of the image.
  • FIG. 1D shows an image 35 whose copying is permitted (hereinafter, referred to as a “copy-permitted image”), and no prohibition information 31 is inserted over the entire image.
  • a copy-free state i.e., copying is permitted
  • copying is unconditionally permitted.
  • coping In the one-time-copy-permitted state, coping is permitted only once.
  • no coping is permitted although displaying the image is allowed.
  • the prohibition information 31 is embedded as shown in FIG. 1B.
  • the permission information 32 is not detected, whereas the prohibition information 31 is detected. In such a case, copying of the image 33 is prohibited.
  • both of the prohibition information 31 and the permission information 32 are embedded as shown in FIG. 1C. If the permission information 32 is detected prior to the copying of the image 34 , copying of the image is permitted.
  • the device for recording data deletes the permission information 32 of the image 34 which had been transmitted from a transmitting medium to the device for recording data, and starts copying the image 34 .
  • the deletion of the permission information 32 the entire permission information 32 may be deleted, or part of the permission information 32 may be deleted. The purpose of such deletion is to make the permission information impossible to be detected as the permission information 32 , i.e., to invalidate the permission information.
  • the permission information 32 has an 8-bit format
  • one bit of such information may be deleted or all of the 8-bit of the information may be deleted.
  • the permission information 32 is structured by the combination of two pieces of information, one of the two pieces of the information may be deleted.
  • the prohibition information 31 is not embedded.
  • copying is permitted unconditionally.
  • the copy control method as described above it is possible to realize control such that copying is permitted N times only, in addition to controlling copy prohibition and permission. Moreover, it is not necessary to disclose the method for embedding the prohibition information or the method for deleting the prohibition information upon copying. Thus, this makes it difficult for an unauthorized party to delete the prohibition information. Furthermore, since the permission information is not embedded upon copying, there is no need for disclosing the method for embedding permission information. Therefore, it is impossible for the unauthorized party to embed permission information. Although the prohibition information is embedded across the entire image according to the description made with reference to FIGS. 1A to 1 D, the prohibition information may be embedded in a certain position in the image.
  • the permission information is embedded in a predetermined position of the image as described above in relation to FIGS. 1A to 1 D.
  • the permission information may be embedded across the entire image.
  • FIG. 2 is a flow chart for illustrating the method for embedding data control information according to Embodiment 1 of the present invention.
  • FIG. 4 is a flow chart for illustrating the method for detecting data control information according to Embodiment 1 of the present invention.
  • a variable Status which indicates one of three states, i.e., (1) a copy-prohibited state; (2) a one-time-copy-permitted state; and (3) a copy-free state, is set first.
  • step S 1 it is determined whether the variable status indicates copy-free state or not. In the case where the variable status indicates the copy-free state, the process is terminated. In the case where the variable status does not indicate the copy-free state, the process goes on to a step S 2 .
  • the prohibition information 31 is embedded in an image.
  • Such an embedding process may be any method for embedding information of one bit or more in an image (e.g., the conventional method for embedding copy control information).
  • the method for embedding copy control information is more complicated than the method for detecting the copy control information.
  • the effects of the present invention are not ruined by the embedding method.
  • Such a method for embedding information in an image is refereed to as Water Mark, and a large number of methods, including the method described in the “DESCRIPTION OF THE RELATED ART”, are known.
  • a method introduced in “Water Mark protects multi-media generation” (Nikkei Electronics, published in Feb. 24, 1997) is known.
  • variable Status indicates the one-time-copy-permitted state. In the case where the variable Status does not indicate the one-time-copy-permitted state, the process is terminated. In the case of the one-time-copy-permitted state, the process goes on to a step S 4 .
  • Step S 4 the permission information 32 is embedded in the image.
  • Step S 4 is a process, for example, as shown in the flow chart of FIG. 3.
  • the process for embedding the permission information at the step S 4 will be described in detail with reference to FIG. 3.
  • a code M which uniquely corresponds to the image is extracted.
  • the extraction of the code M can be realized, for example, by a method in which k predetermined pixels (k is an integer) are selected from the image, and the MBS (i.e., most significant bit) of the data in these pixels is set to be the code M of k bits.
  • the process for extracting the code M is not limited thereto.
  • a method in which k blocks each having 8 ⁇ 8 pixels are selected from the image, and the brightness values of these blocks is set to be the code M of k bits, a method in which a frequency component in the image is calculated, and low frequency components thereof are used as the code M, or the like may be employed. Any extraction method may be employed as long as the method can uniquely extract digital data from the image.
  • a digital signature f(M) is produced using the code M.
  • the digital signature will be described in detail.
  • Specific examples of such a digital signature method include a method utilizing public key cryptography.
  • User A prepares a signature function D (i.e., a first public key) as a function for performing the signature, and prepares an authentication function E (i.e., a second public key) as a function for performing authentication.
  • the authentication function E is set to be an inverse function of the signature function D.
  • User B uses the authentication function E so as to verify whether or not E(C) is identical with M.
  • a mechanism such that the secret digital function D is difficult to derive from the disclosed authentication function E is realized by using a mathematical technique.
  • Such examples include mechanisms utilizing RSA cryptograph, Elgamal cryptograph, and the like.
  • the signature function D is defined by the following expression (1).
  • the authentication function E is defined by the following expression (2).
  • mod n refers to a remainder operation by n, i.e., a remainder, which is an integer, resulting from the division by n.
  • User A discloses n and e, and keeps d, p, and q secret. Accordingly, the authentication function E is disclosed, and the signature function D is kept secret. User A who knows p and q can derive d from e using expression (4). For user B who does not know p and q, however, it is difficult to derive d from n and e.
  • n has the size of about 512 bits. Even if the values of p and q are assumed to have a bit width of 256, the value of n is enormous, i.e., the value of n has about 77 to 78 digits in terms of decimal number system.
  • the signature f(M) is embedded in the image at step S 23 .
  • a method for embedding the signature f(M) in the image there is a method in which the signature is embedded in the edge of the image using a visible pattern such that 0 is represented by white color and 1 is represented by black color.
  • the present invention is not limited to such a method. Any signature embedding method may be employed as long as the method embeds a code having a plurality of bits.
  • LSB i.e., the least significant bit
  • a method in which the signature f(M) is embedded between blanking areas of the image a method using Water Mark which can be easily deleted, or the like may be used.
  • Step S 5 the permission information 32 is detected from an image.
  • Step S 5 is a process, for example, as shown in the flow chart of FIG. 5. With reference to FIG. 5, the process for detecting the permission information at step S 5 of FIG. 4 will be described in detail hereinafter.
  • the signature f(M), which is embedded in the image is detected.
  • the code M is extracted from the image.
  • the same process as that used for extracting the code M at step S 21 in FIG. 3 may be employed.
  • a next step S 26 authentication of the digital signature is performed.
  • the signature produced at step S 22 in FIG. 3 is authenticated.
  • the disclosed information n and the public key e are used.
  • the signature f(M) is assumed to be C
  • the function for authenticating the signature is represented by the aforementioned expression (2). If the result equals M as shown in the aforementioned expression (3), the signature is authenticated. On the other hand, if the result is not identical with M, the signature is not authenticated.
  • step S 27 and 1 is substituted for a permission flag.
  • step S 28 and 0 is substituted for the permission flag.
  • the permission flag is produced in the manner as described above in Embodiment 1 of the present invention, any signal may be used as long as the signal can identify the state where the permission information is embedded and the state where the permission information is not embedded.
  • step S 6 After the permission information is detected in step S 5 in FIG. 4 as described above, the process goes on to a step S 6 , and the determination of the permission flag is performed. If the permission flag is 1, the process goes on to a step S 7 . If the permission flag is 0, the process goes on to a step S 8 .
  • step S 7 the permission information is deleted.
  • the deletion of the permission information is a process for removing the permission information which had been embedded in step S 4 in FIG. 2 from the image. Herein, at least part of the permission information is deleted as described above.
  • the process at step S 7 is completed, the process goes on to a step S 11 , and a copy permission/prohibition flag is set to be 1.
  • the prohibition information is detected.
  • the detection herein refers to the detection of the prohibition information which had been embedded at step S 2 in FIG. 2.
  • the prohibition flag is set to be 1.
  • the prohibition flag is set to be 0.
  • the process goes on to step 59 , and the determination of the prohibition flag is performed. If the prohibition flag is 1, the process goes on to step S 10 . If the prohibition flag is 0, the process goes on to step S 11 .
  • a method for generating the prohibition flag is not limited to the above-described method. Any signal may be used as the prohibition f lag as long as the signal can identify the state where the prohibition information is embedded and the state where the prohibition information is not embedded.
  • the copy permission/prohibition flag is set to be 0, and at step S 11 , the copy permission/prohibition flag is set to be 1.
  • the copy permission/prohibition flag is a signal such that 0 represents the prohibition of copying and 1 represents the permission of copying. Any form of the copying permission/prohibition flag can be employed as long as the signal can identify the prohibition of copying and the permission of copying.
  • the change from the one-time-copy-permitted state to the copy-prohibited state is realized by a means of the embedding and deleting of the permission information.
  • the embedding of the permission information is based on the digital signature. Accordingly, the deletion or detection of the permission information can be easily performed.
  • the prohibition information is embedded by using a method different from the embedding method of the permission information. As a result, it is only necessary to disclose or provide the detecting method to user B. Thus, user A can keep the embedding or deleting method secret.
  • Embodiment 1 of the present invention in addition to controlling for the prohibition and permission to copy, it is possible to realize such control that copying is permitted only once. Therefore, it is possible to realize a data control method, or a method for embedding data control information and a method for detecting the data control information, which make tampering more difficult to conduct as compared to the conventional method.
  • Embodiment 1 of the present invention the method which realizes control such that copying is permitted only once is described.
  • N is an integer greater than or equal to 2
  • it is also possible to realize control such that copying is permitted N times by embedding N pieces of the permission information (N is an integer greater than or equal to 2) upon embedding copy control information, and deleting only one piece of permission information regardless of the number of pieces of permission information found upon detection.
  • the image signal is the subject for the processing according to Embodiment 1 of the present invention
  • an audio signal or a document may be subjected to such processing as well. In such a case, the same effects as those described above can be obtained.
  • the digital signature based on the code M which can be uniquely derived from an image is used as the permission signal in Embodiment 1, the present invention is not limited thereto. Any embedding method may be used. Specifically, without disclosing the method for embedding the permission information to user B, only the deletion method and the detection method are disclosed to user B. If a method in which the embedding method cannot be guessed from the deletion method or the detection method, a method in which the calculation amount of the embedding process is greater than that of the deletion or detection process, a method using a large complicated circuit, or the like is employed, it is possible to further increase tamper resistance. By producing the permission information based on the code M which can be uniquely derived from the image, the image can have one-to-one correspondence with the permission information. This makes unauthorized production of the permission information difficult.
  • Other examples of the method for embedding the permission information include a method in which permission information consists of a first piece of permission information and a second piece of permission information; and the first piece of permission information is embedded in an image using a first embedding method, and the second piece of permission information is simultaneously embedded in the image using a second embedding method.
  • an embedding method which makes the deletion of the embedded information difficult to perform i.e., the same method as used for embedding the prohibition information
  • the first embedding method is used as the first embedding method.
  • a method in which the permission information is visibly embedded in the edge of the image and thus the deletion thereof can be easily performed is used as the second embedding method.
  • the first embedding method herein may be the method same as, or different from, the method for embedding the prohibition information.
  • Examples of the method constituting the first piece of permission information and the second piece of permission information include a method in which either the result of the conversion processing of the code M by a conversion factor or the conversion factor is set to be the first piece of permission information, and the remaining result or conversion factor is set to be the second piece of permission information.
  • any conversion processing method may be used as long as it is a process such that the result of the conversion processing varies depending on the value of its conversion factors.
  • Examples of such a conversion method include arithmetic operations such as addition, subtraction, multiplication, or division using the conversion factors, a logical operation using the conversion factor, an encryption using the conversion factor as a key, a delay process wherein the conversion factor is set as the amount of delay, and the like. It is particularly preferable to employ conversion processing such that it is difficult to derive a conversion factor from the code M and the conversion result.
  • This conversion method has an effect of increasing tamper resistance. Such an effect can be realized by keeping the method for the conversion processing secret.
  • Embodiment 2 of the present invention a data control system for realizing the data control method described in Embodiment 1; and a device for embedding data control information and a device for detecting data control information in said system are described.
  • FIG. 6 is a view for illustrating the structure of the data control system according to Embodiment 2 of the present invention.
  • the data control system includes: a device 41 for embedding data control information (hereinafter, referred to simply as an “embedding device”); a device 42 for detecting data control information (hereinafter, referred to simply as a “detecting device”); a transmitting section 43 ; a recording section 44 ; and a recording medium 45 .
  • An image signal is input to the embedding device 41 , and copy control information is embedded in the image signal. Thereafter, the image signal in which the copy control information is embedded is output to the transmitting section 43 .
  • Examples for the transmission method by the transmitting section 43 include digital transmission or analog transmission by means of radio utilizing a satellite or a ground wave, and digital transmission or analog transmission by means of wire utilizing a telephone line, a coaxial cable, a twisted pair cable, an optical cable, or the like.
  • a digital or analog recording medium such as a magnetic disk, an optical disk, a CD, a DVD, a DVC, a VCR, or the like is also considered to be the transmitting section 43 since the image signal is reproduced from the recording medium as a bit stream.
  • the image signal which is transmitted or reproduced via the transmitting section 43 is input to the detecting device 42 .
  • the copy control information is detected, and a recording permission/prohibition flag indicating whether or not the copying is permitted and image information are output from the detecting device 42 .
  • This information is input to the recording section 44 .
  • the recording section 44 allows the recording medium 45 to record the image information. In the case where the recording permission/prohibition flag indicates copying is prohibited, no recording is performed by the recording section 44 .
  • the recording medium 45 may be any medium as long as it performs the recording of data. Examples of the recording medium 45 include a magnetic disk, an optical disk, a CD, a DVD, a DVC, a VCR, and the like.
  • the embedding device 41 includes a section 411 for embedding prohibition information and a section 412 for embedding permission information.
  • section 411 for embedding prohibition information embeds the prohibition information in the input image signal.
  • the process for embedding the prohibition information is the same as that described in the step S 2 in FIG. 2.
  • section 412 for embedding permission information embeds the permission information in the image signal. The operation of section 412 for embedding permission information will be described later.
  • the detecting device 42 includes a section 421 for detecting prohibition information, a section 422 for detecting and deleting permission information, and a determining section 423 .
  • section 422 for detecting and deleting prohibition information performs detection and deletion of the permission information from the image signal.
  • a permission flag indicating 1 is output.
  • the permission flag indicating 0 is output. The operation of section 422 for detecting and deleting permission information will be described later.
  • section 421 for detecting prohibition information examines whether or not the prohibition information is embedded. If the prohibition information is detected, a prohibition flag indicating 1 is output. If the prohibition information is not detected, the prohibition flag indicating 0 is output.
  • the values of the permission flag and the prohibition flag are input to the determining section 423 . In the case where the permission flag is 1, or the prohibition flag is 0, determining section 423 outputs the recording permission/prohibition flag indicating permission to copy. In the case where the permission flag is 0 and the prohibition flag is 1, the recording permission/prohibition flag indicating that copying is prohibited is output by determining section 423 .
  • the image in which the permission information is embedded is allowed to be copied after the permission information is deleted.
  • copying of the image is permitted.
  • copying of the image is prohibited.
  • section 412 for embedding permission information and section 422 for detecting and deleting permission information will be described with reference to FIGS. 7 and 8.
  • section 412 for embedding permission information includes a section 51 for embedding a signature (hereinafter, referred to as “signature embedding section”), a section 52 for extracting a code (hereinafter, referred to as “code extracting section”), and a signature section 53 .
  • signature embedding section a section 51 for embedding a signature
  • code extracting section a section 52 for extracting a code
  • section 412 for embedding permission information the code extracting section 52 generates a code M which can be uniquely derived from the image signal. Then, the code M is output to signature section 53 . Thereafter, signature section 53 converts the code M to the digital signature f(M). The digital signature f(M) is then output to signature embedding section 51 . Subsequently, signature embedding section 51 embeds the digital signature f(M) in the image signal. In the case where the permission information is not to be embedded, the process for embedding the digital signature f(M) is not performed.
  • the method for generating the code M in code extracting section 52 the method for generating the digital signature f(M) in signature section 53 , and the method for embedding the signature in signature embedding section 51 are the same as the processes at steps S 21 , S 22 , and S 23 in FIG. 3, respectively.
  • section 422 for detecting and deleting permission information includes section 54 for extracting and deleting a signature (hereinafter, referred to as “signature extracting and deleting section”), section 55 for extracting a code (hereinafter, referred to as “code extracting section”), and authentication section 56 .
  • the signature extracting and deleting section 54 extracts the digital signature f(M) from the image signal and deletes at least part of the digital signature f(M) from the image signal.
  • code extracting section 55 generates the code M from the image signal in the same manner as that of code extracting section 52 .
  • the code M is then output to authentication section 56 .
  • authentication section 56 authenticates the digital signature f(M) based upon the code M, and outputs the recording permission/prohibition flag indicating whether recording is permitted. If the digital signature f(M) is not authenticated, the recording permission/prohibition flag indicating a prohibition against recording is output.
  • the method for extracting the signature in the signature extracting and deleting section 54 , the method for generating the code M in the code extracting section 55 , and the authentication method in the authentication section 56 are the same as those described with reference to FIG. 5, respectively.
  • Embodiment 2 of the present invention in addition to controlling the prohibition and permission to copy, it is possible to realize control such that copying is permitted only once. Therefore, it is possible to realize a data control system, and a device for embedding data control information and a device for detecting the data control information in said system, which make tampering more difficult to conduct as compared to the conventional method.
  • Embodiment 2 of the present invention the method for realizing control such that copying is permitted only once is described.
  • N is a natural number greater than or equal to 1
  • it is also possible to realize control such that copying is permitted N times by embedding N pieces of permission information (N is a natural number greater than or equal to 1) upon embedding copy control information, and deleting only one piece of permission information regardless of the number of pieces of permission information found upon detection.
  • the embedding device 41 has the structure as shown in FIG. 6 in Embodiment 2 of the present invention, the structure thereof is not limited thereto.
  • the positions of section 411 for embedding prohibition information and section 412 for embedding permission information may be switched.
  • the embedding device may have any structure such that the device embeds at least the prohibition information for an image whose copying is prohibited, and embeds both of the prohibition information and the permission information for an image whose copying is permitted once.
  • the detecting device 42 has the structure as shown in FIG. 6, the structure thereof is not limited thereto.
  • the image signal input to section 422 for detecting and deleting permission information may be directly input to section 421 for detecting prohibition information.
  • the detecting device 42 may have the structure such that section 422 for detecting and deleting permission information is separated into a device for detecting permission information and a device for deleting the permission information, or the like.
  • the detecting device 42 may have any structure such that copying is permitted upon the detection of the permission information and the permission information is deleted, and copying is prohibited if the prohibition information is detected.
  • the permission signal is not limited thereto. Any embedding method can be used. Specifically, without disclosing the embedding method to user B, only the deletion method and the detection method are disclosed. If a method in which the embedding method cannot be guessed from the deletion method or the detection method, a method in which the calculation amount in the embedding process is greater than that of the deletion or detection process, or a method using a large complicated circuit, or the like is employed, it is possible to further increase the tamper resistance. By producing the permission information based on the code M which can be uniquely obtained from the image, an image can have one-to-one correspondence with the permission information. This makes the unauthorized production of the permission information difficult.
  • Other examples of the method for embedding the permission information include a method in which permission information consists of a first piece of permission information and a second piece of permission information; and the first piece of permission information is embedded in an image using a first embedding method, and the second piece of permission information is simultaneously embedded in the image using a second embedding method.
  • an embedding method which makes the deletion of the embedded information difficult to perform i.e., the same method as used for embedding the prohibition information
  • the first embedding method is used as the first embedding method.
  • a method in which the permission information is visibly embedded in the edge of the image and thus the deletion thereof can be easily performed is used as the second embedding method.
  • the first embedding method herein may be the method same as, or different from, the method for embedding the prohibition information.
  • Examples of the method constituting the first piece of permission information and the second piece of permission information include a method in which either the result of the conversion processing of the code M by a conversion factor or the conversion factor is set to be the first piece of permission information, and the remaining result or conversion factor is set to be the second piece of permission information.
  • any conversion processing method may be used as long as it is a process such that the result of the conversion processing varies depending on the value of its conversion factors.
  • Examples of such a conversion method include arithmetic operations such as addition, subtraction, multiplication, or division using the conversion factors, a logical operation using the conversion factor, an encryption using the conversion factors as a key, a delay process wherein the conversion factor is set as the amount of delay, and the like. It is particularly preferable to employ conversion processing such that it is difficult to derive a conversion factor from the code M and the conversion result.
  • This conversion method has an effect of increasing tamper resistance. Such an effect can be realized by keeping the method for the conversion processing secret.
  • method for detecting data control information or device for detecting data control information permits copy when data control information is not detected.
  • the present invention is not limited thereto. When it does not detect data control information, it can prevent data from copying. Alternatively, when it detects information that denotes copy-free, it can permit the copying of the data.
  • the producer of the data since the producer of the data embeds the permission information in the data using a digital signature, it is impossible for a person who accesses the data to tamper with the permission information.
  • the permission information since the permission information is generated based on the code which can be uniquely derived from the data, the permission information has a one-to-one correspondence with the data. Thus, it is possible to make tampering with the permission information difficult.
  • data when the permission information is detected from data, data can be recorded on a recording medium.
  • the number of times the data can be processed can be limited to N; and when data in which the prohibition information alone is inserted is input, data processing can be prohibited.
US09/915,913 1997-07-07 2001-07-25 Data control method, method for embedding data control information, method for detecting data control information, device for embedding data control information, device for detecting data control information, and device for recording data Abandoned US20020003879A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US09/915,913 US20020003879A1 (en) 1997-07-07 2001-07-25 Data control method, method for embedding data control information, method for detecting data control information, device for embedding data control information, device for detecting data control information, and device for recording data

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
JP18145997 1997-07-07
JP9-181459 1997-07-07
US09/110,560 US6434538B1 (en) 1997-07-07 1998-07-06 Data control method, for embedding data control information, method for detecting data control information, device for embedding data control information and device for recording data
US09/915,913 US20020003879A1 (en) 1997-07-07 2001-07-25 Data control method, method for embedding data control information, method for detecting data control information, device for embedding data control information, device for detecting data control information, and device for recording data

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/110,560 Continuation US6434538B1 (en) 1997-07-07 1998-07-06 Data control method, for embedding data control information, method for detecting data control information, device for embedding data control information and device for recording data

Publications (1)

Publication Number Publication Date
US20020003879A1 true US20020003879A1 (en) 2002-01-10

Family

ID=16101134

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/110,560 Expired - Lifetime US6434538B1 (en) 1997-07-07 1998-07-06 Data control method, for embedding data control information, method for detecting data control information, device for embedding data control information and device for recording data
US09/915,913 Abandoned US20020003879A1 (en) 1997-07-07 2001-07-25 Data control method, method for embedding data control information, method for detecting data control information, device for embedding data control information, device for detecting data control information, and device for recording data

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/110,560 Expired - Lifetime US6434538B1 (en) 1997-07-07 1998-07-06 Data control method, for embedding data control information, method for detecting data control information, device for embedding data control information and device for recording data

Country Status (1)

Country Link
US (2) US6434538B1 (US20020003879A1-20020110-M00001.png)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040170276A1 (en) * 2001-11-27 2004-09-02 Fumitomo Yamasaki Information recorder, system for copying information, method for copying information, program and computer readable recording medium
US7065212B1 (en) * 2000-10-27 2006-06-20 Matsushita Electric Industrial Co., Ltd. Data hiding in communication
US7181008B1 (en) * 1999-07-09 2007-02-20 Kabushiki Kaisha Toshiba Contents management method, content management apparatus, and recording medium
US20090190753A1 (en) * 2008-01-28 2009-07-30 Hitachi, Ltd. Recording apparatus and recording method
US20090213410A1 (en) * 2008-02-22 2009-08-27 Konica Minolta Business Technologies, Inc. Image processing apparatus, image processing method and recording medium
US7631358B1 (en) * 1998-09-23 2009-12-08 Thomson Licensing Copy protection method for digital data stored on a medium
US20100060923A1 (en) * 2008-09-09 2010-03-11 Canon Kabushiki Kaisha Apparatus, method and program
US20110271116A1 (en) * 2005-10-10 2011-11-03 Ronald Martinez Set of metadata for association with a composite media item and tool for creating such set of metadata
US20120233712A1 (en) * 2009-11-20 2012-09-13 Siemens Aktiengesellschaft Method and Device for Accessing Control Data According to Provided Permission Information
US20130133058A1 (en) * 2004-04-23 2013-05-23 Rockstar Consortium Us Lp Security bridging
US10019500B2 (en) 2005-02-28 2018-07-10 Huawei Technologies Co., Ltd. Method for sharing and searching playlists

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4313873B2 (ja) * 1998-01-30 2009-08-12 キヤノン株式会社 電子機器及びデータ処理方法
JP2000156034A (ja) * 1998-11-18 2000-06-06 Sony Corp ディジタル信号記憶装置、ディジタル信号記憶方法、プログラム記録媒体、ディジタル信号記録装置及びディジタル信号記録方法
EP1118961B1 (en) * 1999-11-25 2007-08-29 Matsushita Electric Industrial Co., Ltd. Apparatus and method for embedding information for tamper detection
US6947909B1 (en) * 2000-05-12 2005-09-20 Hoke Jr Clare L Distribution, recognition and accountability system for intellectual and copy written properties in digital media's
CN1279532C (zh) * 2000-10-31 2006-10-11 索尼公司 用于记录/播放嵌入附加信息的音频数据的装置及方法
US7372964B2 (en) * 2001-10-10 2008-05-13 Kabushiki Kaisha Toshiba Method and apparatus for recording information including secret information and method and apparatus for reproduction thereof
JP3894883B2 (ja) * 2002-12-13 2007-03-22 シャープ株式会社 画像形成装置
JP4298365B2 (ja) * 2003-04-25 2009-07-15 キヤノン株式会社 画像処理装置、コンピュータプログラムおよびコンピュータ読み取り可能な記録媒体
US20080271153A1 (en) * 2007-04-27 2008-10-30 General Instrument Corporation Method and Apparatus for Handling of Content that includes a Mix of CCI Segments
JP2010134578A (ja) * 2008-12-03 2010-06-17 Fujitsu Microelectronics Ltd 情報処理装置、およびコンテンツ保護方法

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5293422A (en) * 1992-09-23 1994-03-08 Dynatek, Inc. Usage control system for computer software
US5530751A (en) * 1994-06-30 1996-06-25 Hewlett-Packard Company Embedded hidden identification codes in digital objects
US5659613A (en) * 1994-06-29 1997-08-19 Macrovision Corporation Method and apparatus for copy protection for various recording media using a video finger print
US5719937A (en) * 1995-12-06 1998-02-17 Solana Technology Develpment Corporation Multi-media copy management system
US5765152A (en) * 1995-10-13 1998-06-09 Trustees Of Dartmouth College System and method for managing copyrighted electronic media
US5829980A (en) * 1996-03-04 1998-11-03 Sheridan; John J. Gasket for vacuum thermoforming machine
US5907443A (en) * 1990-05-30 1999-05-25 Canon Kabushiki Kaisha Recording and reproducing apparatus adapted to selectively control the number of copies made
US5912972A (en) * 1994-12-14 1999-06-15 Sony Corporation Method and apparatus for embedding authentication information within digital data
US5923486A (en) * 1994-12-22 1999-07-13 Sony Corporation Recording and reproducing system for protecting copyrighted data
US5960398A (en) * 1996-07-31 1999-09-28 Wictor Company Of Japan, Ltd. Copyright information embedding apparatus

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5057947A (en) * 1988-02-10 1991-10-15 Matsushita Electric Industrial Co., Ltd. Recording and reproducing apparatus with limited digital copying
JPH064884A (ja) * 1992-06-17 1994-01-14 Canon Inc 情報記録再生装置
US5450489A (en) 1993-10-29 1995-09-12 Time Warner Entertainment Co., L.P. System and method for authenticating software carriers
US5629980A (en) * 1994-11-23 1997-05-13 Xerox Corporation System for controlling the distribution and use of digital works
JPH0944994A (ja) 1995-07-31 1997-02-14 Matsushita Electric Ind Co Ltd コピー防止装置
EP1381217A1 (en) * 1997-01-17 2004-01-14 Nec Corporation Image data illegal use prevention system
JP2000182320A (ja) * 1998-12-17 2000-06-30 Victor Co Of Japan Ltd 圧縮符号化防止方法

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5907443A (en) * 1990-05-30 1999-05-25 Canon Kabushiki Kaisha Recording and reproducing apparatus adapted to selectively control the number of copies made
US5293422A (en) * 1992-09-23 1994-03-08 Dynatek, Inc. Usage control system for computer software
US5659613A (en) * 1994-06-29 1997-08-19 Macrovision Corporation Method and apparatus for copy protection for various recording media using a video finger print
US5530751A (en) * 1994-06-30 1996-06-25 Hewlett-Packard Company Embedded hidden identification codes in digital objects
US5912972A (en) * 1994-12-14 1999-06-15 Sony Corporation Method and apparatus for embedding authentication information within digital data
US5923486A (en) * 1994-12-22 1999-07-13 Sony Corporation Recording and reproducing system for protecting copyrighted data
US5765152A (en) * 1995-10-13 1998-06-09 Trustees Of Dartmouth College System and method for managing copyrighted electronic media
US5719937A (en) * 1995-12-06 1998-02-17 Solana Technology Develpment Corporation Multi-media copy management system
US5829980A (en) * 1996-03-04 1998-11-03 Sheridan; John J. Gasket for vacuum thermoforming machine
US5960398A (en) * 1996-07-31 1999-09-28 Wictor Company Of Japan, Ltd. Copyright information embedding apparatus

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7631358B1 (en) * 1998-09-23 2009-12-08 Thomson Licensing Copy protection method for digital data stored on a medium
US7181008B1 (en) * 1999-07-09 2007-02-20 Kabushiki Kaisha Toshiba Contents management method, content management apparatus, and recording medium
US7505584B2 (en) 1999-07-09 2009-03-17 Kabushiki Kaisha Toshiba Contents management method, contents management apparatus, and recording medium
US7065212B1 (en) * 2000-10-27 2006-06-20 Matsushita Electric Industrial Co., Ltd. Data hiding in communication
US8306393B2 (en) 2001-11-27 2012-11-06 Panasonic Corporation Information recording apparatus, information copying system, method for copying information, program and computer readable recording medium
US7327935B2 (en) 2001-11-27 2008-02-05 Matsushita Electric Industrial Co., Ltd. Information recorder, system for copying information, method for copying information, program and computer readable recording medium
US20080095513A1 (en) * 2001-11-27 2008-04-24 Matsushita Electric Industrial Co., Ltd. Information recording apparatus, information copying system, method for copying information, program and computer readable recording medium
US20040170276A1 (en) * 2001-11-27 2004-09-02 Fumitomo Yamasaki Information recorder, system for copying information, method for copying information, program and computer readable recording medium
US8959610B2 (en) * 2004-04-23 2015-02-17 Constellation Technologies LLC. Security bridging
US20150007303A1 (en) * 2004-04-23 2015-01-01 Rockstar Consortium Us Lp Security bridging
US20130133058A1 (en) * 2004-04-23 2013-05-23 Rockstar Consortium Us Lp Security bridging
US10521452B2 (en) 2005-02-28 2019-12-31 Huawei Technologies Co., Ltd. Method and system for exploring similarities
US11048724B2 (en) 2005-02-28 2021-06-29 Huawei Technologies Co., Ltd. Method and system for exploring similarities
US11789975B2 (en) 2005-02-28 2023-10-17 Huawei Technologies Co., Ltd. Method and system for exploring similarities
US11709865B2 (en) 2005-02-28 2023-07-25 Huawei Technologies Co., Ltd. Method for sharing and searching playlists
US11573979B2 (en) 2005-02-28 2023-02-07 Huawei Technologies Co., Ltd. Method for sharing and searching playlists
US10019500B2 (en) 2005-02-28 2018-07-10 Huawei Technologies Co., Ltd. Method for sharing and searching playlists
US11468092B2 (en) 2005-02-28 2022-10-11 Huawei Technologies Co., Ltd. Method and system for exploring similarities
US10614097B2 (en) 2005-02-28 2020-04-07 Huawei Technologies Co., Ltd. Method for sharing a media collection in a network environment
US10860611B2 (en) 2005-02-28 2020-12-08 Huawei Technologies Co., Ltd. Method for sharing and searching playlists
US20110271116A1 (en) * 2005-10-10 2011-11-03 Ronald Martinez Set of metadata for association with a composite media item and tool for creating such set of metadata
US20090190753A1 (en) * 2008-01-28 2009-07-30 Hitachi, Ltd. Recording apparatus and recording method
US20090213410A1 (en) * 2008-02-22 2009-08-27 Konica Minolta Business Technologies, Inc. Image processing apparatus, image processing method and recording medium
US8582136B2 (en) * 2008-02-22 2013-11-12 Konica Minolta Business Technologies, Inc. Image processing apparatus, method, and recording medium for ensuring the authenticity of a document
US20100060923A1 (en) * 2008-09-09 2010-03-11 Canon Kabushiki Kaisha Apparatus, method and program
US20120233712A1 (en) * 2009-11-20 2012-09-13 Siemens Aktiengesellschaft Method and Device for Accessing Control Data According to Provided Permission Information

Also Published As

Publication number Publication date
US6434538B1 (en) 2002-08-13

Similar Documents

Publication Publication Date Title
US6434538B1 (en) Data control method, for embedding data control information, method for detecting data control information, device for embedding data control information and device for recording data
JP2915904B2 (ja) データ制御方法、データ制御情報埋込方法、データ制御情報検出方法、データ制御情報埋込装置、データ制御情報検出装置及び記録装置
EP0852441B1 (en) Data hiding method
US6504941B2 (en) Method and apparatus for digital watermarking of images
Holliman et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
Celik et al. Hierarchical watermarking for secure image authentication with localization
KR100465950B1 (ko) 정보 처리 장치 및 그 제어 방법, 컴퓨터 프로그램을 저장한 저장 매체
US6266429B1 (en) Method for confirming the integrity of an image transmitted with a loss
EP1566763B1 (en) Watermarking of limited colour images
US20020016916A1 (en) Watermarking of digital object
EP1865459A1 (en) The method of digital watermark and the corresponding device, and digital camera which can append watermark
Yeung et al. Fragile watermarking of three-dimensional objects
US20070061585A1 (en) Watermark system
Li et al. Image authentication and integrity verification via content-based watermarks and a public key cryptosystem
Chang et al. Digital watermarking scheme using human visual effects
Munir A secure fragile video watermarking algorithm for content authentication based on arnold CAT map
Izquierdo et al. An ill-posed operator for secure image authentication
US6643383B1 (en) Method for hiding binary data in a digital image
Zhong et al. A new fragile watermarking technique for image authentication
JP2000156781A (ja) 電子透かし埋め込み装置、不正検知装置及びコンピュータ読み取り可能な記憶媒体
Chotikakamthorn et al. Digital watermarking technique for image authentication by neighbouring block similarity measure
Abdelrahman Mohamed Mostafa Overview and Classification of Digital Watermarking Algorithms
Jia et al. Digital watermark-based security technology for geo-spatial graphics data
Li et al. Image integrity and authenticity verification via content-based watermarks and a public key cryptosystem
Subashini et al. A blind watermarking using MSB insertion to embed multiple watermarks

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION