US20130343725A1 - Correlation-based system for watermarking continuous digital media - Google Patents
Correlation-based system for watermarking continuous digital media Download PDFInfo
- Publication number
- US20130343725A1 US20130343725A1 US13/920,721 US201313920721A US2013343725A1 US 20130343725 A1 US20130343725 A1 US 20130343725A1 US 201313920721 A US201313920721 A US 201313920721A US 2013343725 A1 US2013343725 A1 US 2013343725A1
- Authority
- US
- United States
- Prior art keywords
- signature
- buffer
- correlation
- enable
- unique digital
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 claims abstract description 29
- 230000008569 process Effects 0.000 claims abstract description 16
- 238000007906 compression Methods 0.000 claims abstract description 7
- 230000002596 correlated effect Effects 0.000 claims abstract description 7
- 230000006835 compression Effects 0.000 claims abstract description 5
- 239000000872 buffer Substances 0.000 claims description 79
- 230000007704 transition Effects 0.000 claims description 23
- 230000004044 response Effects 0.000 claims description 7
- 230000003139 buffering effect Effects 0.000 claims description 5
- 230000002441 reversible effect Effects 0.000 claims description 2
- 238000001514 detection method Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 2
- 230000006837 decompression Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000002829 reductive effect Effects 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000001276 controlling effect Effects 0.000 description 1
- 230000000875 corresponding effect Effects 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000000873 masking effect Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N9/00—Details of colour television systems
- H04N9/79—Processing of colour television signals in connection with recording
- H04N9/80—Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
- G06T1/0035—Output size adaptive watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0085—Time domain based watermarking, e.g. watermarks spread over several images
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
- G10L19/018—Audio watermarking, i.e. embedding inaudible data in the audio signal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/422—Input-only peripherals, i.e. input devices connected to specially adapted client devices, e.g. global positioning system [GPS]
- H04N21/4223—Cameras
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/47—End-user applications
- H04N21/472—End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/81—Monomedia components thereof
- H04N21/8106—Monomedia components thereof involving special audio data, e.g. different tracks for different languages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
- H04N21/8358—Generation of protective data, e.g. certificates involving watermark
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/1675—Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/173—Analogue secrecy systems; Analogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
- H04N7/17309—Transmission or handling of upstream communications
- H04N7/17318—Direct or substantially direct transmission and handling of requests
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2200/00—Indexing scheme for image data processing or generation, in general
- G06T2200/28—Indexing scheme for image data processing or generation, in general involving image processing hardware
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0053—Embedding of the watermark in the coding stream, possibly without decoding; Embedding of the watermark in the compressed domain
Definitions
- the present invention relates to multimedia authentication and more particularly to a correlation-based system for watermarking continuous digital media.
- the primary area for the application of the present invention is the content authentication and ownership identification for continuous digital media that are prone to active attacks such as unauthorized removal and unauthorized embedding.
- a method of “correlation” is thus introduced while watermarks are being created.
- Watermarking has been widely used for the applications of multimedia authentication and copyright protection.
- Video watermarking in particular, is unique to other types of media watermarking in that it deals primarily with real-time continuous bitstreams.
- Many prior art references have focused on watermarking at the video compression level. See for example, D. Simitopoulos, N. Zissis, P. Georgiadis, V. Emmanouilidis, and M. G. Strintzis, “ Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD ,” Multimedia Systems 9: pp 217-227, 2003; N. J. Mathai, D. Kundur, and A.
- Haitsma “Digital Watermarking for DVD Video Copy Protection,” IEEE Sigmal Processing Magazine, September 2000. Although these methods generally produce good protection by taking into consideration the information contents of the underlying video, they tend to consume extra processing power that can otherwise be used to improve the performance of the encoder and/or reduce the latencies caused by time-critical tasks.
- the present invention provides for an efficient implementation of video watermarking at the system level and yet produces good protection and authentication on the recorded videos.
- the present invention is a correlation-based system for watermarking continuous digital media.
- the correlation-based system includes an application control module (ACM) including a graphical user interface (GUI).
- ACM provides: i) an enable/disable control signal in response to a command by the user via the GUI; and, ii) a reset signal.
- a media encoder receives uncompressed media data from a media source and provides compressed media frames (F j ).
- a file system captures the compressed media data from the media encoder.
- a software retrieval module (SRM) retrieves the compressed media frames (F j ) from the file system.
- a first signature buffer buffers a previously generated signature (S j ⁇ 1 ).
- a second signature buffer is operatively connected to the first signature buffer for buffering a currently generated unique digital signature (S j ), wherein a transition from the second signature buffer to the first signature buffer occurs when a transition takes place from one frame to the next.
- a third signature buffer stores a predefined initial signature (S 0 ).
- a 2:1 multiplexer (MUX) receives an input from the first signature buffer (S j ⁇ 1 ), and another input from the third signature buffer (S 0 ).
- the reset signal from the ACM is a select control input signal to the 2:1 MUX, wherein one of the two inputs (S j ⁇ 1 ) and (S 0 ) is selected as the output from the 2:1 MUX depending on the logic value of the reset signal.
- a signature generator is operatively connected to the SRM, to the 2:1 MUX, and to the ACM, for generating a unique digital signature (S j ) based on i) the F j , ii) the output from the 2:1 MUX, and iii) the status of the enable/disable control signal.
- the signature generator provides the S j to the second signature buffer if the enable/disable control signal is set to “enable”.
- the signature generator provides no signature if the enable/disable control signal is set to “disable”.
- An encryptor receives the unique digital signature (S j ) and encrypts the unique digital signature if the enable/disable control signal is set to “enable”, and then stores the encrypted unique digital signature (E j ) to the file system.
- the signature generator provides no signature to the encryptor if the enable/disable control signal is set to “disable”.
- the present watermarking method applies to continuous digital media data such as video or audio rather than still images.
- the method can be applied directly to the compressed media data. Therefore, the amount of data to be processed is tremendously reduced.
- No knowledge of the underlying media compression algorithm is required in the present method; hence the computational complexity is greatly reduced. This is contrary to many prior art systems where the watermarking techniques are built on top of the compression algorithms.
- the present method applies directly to the compressed media frames with variable lengths rather than to the uncompressed frames with a common fixed length. This increases the difficulty of tampering without being detected.
- a unique digital signature is to be generated per each frame based on the input data from the current compressed frame and the previous signature.
- No specific digital signature generation algorithm is preferred.
- the signature thus generated is “correlated” with the previous frame via the previously generated signature. This makes the detection of the piracy very easy, for if any frame has been modified, all the signatures corresponding to that frame and beyond will be wrong.
- All the digital signatures are “correlatively” generated on and on until it is instructed to “reset” to the initial signature to begin a new correlated signature generation process. The control of the “reset” further creates the dynamics to the pattern of the signatures being generated, which makes the media content even more difficult from being tampered with.
- the overall watermarking operation of the present invention can be easily implemented at the Application level, which requires very minimum system resource and therefore can be easily integrated with the entire system.
- a fast “False Detection” program can be easily written to detect and identify which frame or frames have been tampered without the need of decoding the entire media content—a tremendous saving in time can be achieved.
- the watermarking technique of the present invention is commonly applied to digital media such as video and audio. However, the same method is applicable to any digital media that are continuous in nature.
- FIG. 1 is a flow diagram illustrating the correlation-based system for watermarking continuous digital media of the present invention.
- FIG. 2 is a flow diagram illustrating an example of the operation of the present invention.
- FIGS. 3A-3F illustrate the FIG. 2 example with step-by-step details.
- FIG. 1 illustrates a preferred embodiment of the correlation-based system for watermarking continuous digital media of the present invention, designated generally as 10 .
- This correlation-based system 10 includes an application control module (ACM) 12 that includes a graphical user interface (GUI) 14 .
- ACM 12 provides an enable/disable control signal 16 and a reset signal 18 in response to a command by the user via the GUI 14 and file system information 20 , respectively.
- the ACM 12 may be embodied as part of application software which allows users to provide control and configuration to a typical stationary Digital Video Recording (DVR) system or a completely embedded control software in a mobile DVR system which is generally installed and operated in a mobile vehicle such as a police car or a bus.
- DVR Digital Video Recording
- a file system 22 captures compressed continuous media data 23 from the Media Encoder (ME) 25 .
- the compressed continuous media data is generally embodied in forms of media frames (F j ).
- the ME 25 receives the uncompressed media data 29 from a media source such as a camera 27 .
- the uncompressed media data 29 may be audio/video data, solely video data or solely audio data. Furthermore, it may be in analog form or digital form. If it is in analog form the media encoder 25 typically provides a conversion from analog to digital.
- the compressed media data may be audio/video data, solely video data or solely audio data.
- a software retrieval module (SRM) 26 retrieves the compressed media frames (F j ) from the file system 22 , as indicated by numeral designation 28 . To retrieve the frames, the SRM 26 must first perform a “File Open” function call to the File System 22 to obtain a File Pointer which points to the location of the file containing the header associated with the compressed media data. The SRM 26 then reads the length of the compressed media frame F j based on this File Pointer and calculates the Frame Pointer pointing to the location of the frame F j in the file system 22 . The SRM 26 is now ready to fetch the frame data F j based on the calculated Frame Pointer.
- the SRM 26 described above is shown as a stand alone software module in FIG. 1 , it is not necessarily to be included as a dedicated software module in the entire system. For example, depending on the implementation, the same functions described above for the SRM 26 can be embedded as an integral part of other software modules.
- a first Signature Buffer 30 buffers the previously generated signature (S j ⁇ 1 ).
- a second Signature Buffer 34 buffers the currently generated unique digital signature (S j ).
- S j ⁇ S j ⁇ 1 takes place from the second Signature Buffer 34 to the first Signature Buffer 30 when a transition takes place from frame (F j ) to frame (F j+1 ).
- MUX 2:1 multiplexer
- the previously generated signature (S j ⁇ 1 ) in the first Buffer 30 will be selected as the output 41 of the MUX 40 .
- the logic level of the reset signal 18 is normally set to HIGH at the beginning of the entire operation and dropped down to LOW immediately after the very first signature is generated and retained at the LOW level for the rest of the operation so that the previously generated signature (S j ⁇ 1 ) can always participate in the signature generation process for the current signature (S j ).
- the reset signal 18 can be set to HIGH as many times as desired during the course of the operation.
- a signal generator 42 is operatively connected to the SRM 26 , the 2:1 MUX 40 , and to the ACM 12 , for generating a current unique digital signature (S j ) based on the current compressed frame F j , the previously generated digital signature S j ⁇ 1 and the status of the enable/disable control signal 16 . If the enable/disable control signal 16 is set to Enable by the ACM 12 , the signature generator 42 will operate normally. However, if the enable/disable control signal 16 is set to Disable by the ACM 12 , the signature generator 42 will be shut down and no signature will be generated, thus no watermark will be created. The setting of the enable/disable control signal 16 is normally done through a static configuration at the beginning of a recording session.
- the signature generator 42 provides the current signature S j 36 to the second signature buffer 34 if the enable/disable control signal 16 is set to Enable.
- any signature generation algorithm such as the Cyclic Redundancy Code (CRC), can be used in the signature generator 42 .
- An encryptor 44 receives the unique digital signature (S j ) 35 and encrypts the unique digital signature if the enable/disable control signal 16 is set to Enable. Any suitable reversible encryption algorithm (e.g., 64/128-bit AES/DES) can be employed in the encryptor 44 .
- the encrypted unique digital signature (E j ) 24 is stored in the file system 22 .
- the encryptor 44 is a preferred implementation, it may not constitute a critical element of the present invention. Therefore its implementation may be optionally eliminated. If this is the case, then the unique digital signature (S j ) 37 generated by the signature generator 42 will be stored to the file system 22 directly.
- FIG. 2 shows an example during the operation of the present system, designated generally as 55 ; and, FIGS. 3A-3F illustrate the FIG. 2 example with step-by-step details, designated generally as 70 , 90 , 110 , 130 , 150 , and 170 , respectively.
- both video frames 60 and the signatures 61 are correlated through a 2:1 multiplexer 56 , three buffers: the first signature buffer 57 , the second signature buffer 58 , the third signature buffer 59 , and the signature generator 63 .
- An initial signature S 0 62 will be preloaded to the third signature buffer 59 by the application.
- the generated signatures 64 from the signature generator 63 will be sent to the encryptor, as shown by numeral designation 65 , as well as stored in the second signature buffer 58 .
- the first signature buffer 71 which is used to store the previously generated signature, will contain some value XX 72 (which is irrelevant to the operation).
- both S 0 73 in the third buffer 74 and XX 72 in the first buffer 71 are the inputs to the 2:1 multiplexer 75 .
- the reset signal 76 is set to HIGH (binary 1 ) initially by the application. This setting will select the initial signature S 0 77 as the output from the multiplexer 75 .
- This output will then be concatenated with the first frame F 1 78 to form a new frame S 0 ⁇ F 1 79 , which in turn will be the input to the signature generator 80 .
- the first signature S 1 81 will then be generated and output from the signature generator 80 to the second signature buffer 82 as well as the encryptor 83 .
- a transition step designated generally as 90 as soon as the generation of the first signature S 1 is completed, as shown in FIG. 3A , the process transitions from the first frame to the second frame.
- the signature S 1 91 residing previously in the second signature buffer 103 will be stored to the first signature buffer 92 .
- Both of the signatures S 0 93 in the third signature buffer 94 and S 1 95 in the first signature buffer 92 will be the inputs to the 2:1 multiplexer 96 .
- the application control module 12 will then reset the reset signal 97 to LOW (binary 0). This setting will select the signature S 1 98 in the first signature buffer 92 as the output from the multiplexer 96 .
- This output will then be concatenated with the second frame F 2 99 to form a new frame S 1 ⁇ F 2 100 , which in turn will be the input to the signature generator 101 .
- the second signature S 2 102 will then be generated and output from the signature generator 101 to the second signature buffer 103 as well as the encryptor 104 .
- a transition step designated generally as 110 as soon as the generation of the second signature S 2 is completed, as shown in FIG. 3B , the process transitions from the second frame to the third frame, as shown in FIG. 3C .
- the signature S 2 111 residing previously in the second signature buffer 123 will be stored to the first signature buffer 112 .
- Both of the signatures S 0 113 in the third signature buffer 114 and S 2 115 in the first signature buffer 112 will be the inputs to the 2:1 multiplexer 116 .
- the reset signal 117 retains at LOW (binary 0). This setting will select the signature S 2 118 in the first signature buffer 112 as the output from the multiplexer 116 .
- This output will then be concatenated with the third frame F 3 119 to form a new frame S 2 ⁇ F 3 120 , which in turn will be the input to the signature generator 121 .
- the third signature S 3 122 will then be generated and output from the signature generator 121 to the second signature buffer 123 as well as the encryptor 124 .
- a transition step designated generally as 130
- the process transitions from the third frame to the forth frame, as is shown in FIG. 3D .
- the signature S 3 131 residing previously in the second signature buffer 143 will be stored to the first signature buffer 132 .
- Both of the signatures S 0 133 in the third signature buffer 134 and S 3 135 in the first signature buffer 132 will be the inputs to the 2:1 multiplexer 136 .
- the reset signal 137 retains at LOW (binary 0). This setting will select the signature S 3 138 in the first signature buffer 132 as the output from the multiplexer 136 .
- This output will then be concatenated with the forth frame F 4 139 to form a new frame S 3 ⁇ F 4 140 , which in turn will be the input to the signature generator 141 .
- the fourth signature S 4 142 will then be generated and output from the signature generator 141 to the second signature buffer 143 as well as the encryptor 144 .
- a transition step designated generally as 150
- the process transitions from the forth frame to the fifth frame, as is shown in FIG. 3E .
- the signature S 4 151 residing previously in the second signature buffer 163 will be stored to the first signature buffer 152 .
- Both of the signatures S 0 153 in the third signature buffer 154 and S 4 155 in the first signature buffer 152 will be the inputs to the 2:1 multiplexer 156 .
- the reset signal 157 now is set back to HIGH (binary 1) by the application.
- This setting will select the initial signature S 0 158 in the third signature buffer 154 as the output from the multiplexer 156 . This output will then be concatenated with the fifth frame F 5 159 to form a new frame S 0 ⁇ F 5 160 , which in turn will be the input to the signature generator 161 .
- the fifth signature S 5 162 will then be generated and output from the signature generator 161 to the second signature buffer 163 as well as the encryptor 164 .
- a transition step designated generally as 170
- the process transitions from the fifth frame to the sixth frame, as is shown in FIG. 3F .
- the signature S 5 171 residing previously in the second signature buffer 183 will be stored to the first signature buffer 172 .
- Both of the signatures S 0 173 in the third signature buffer 174 and S 5 175 in the first signature buffer 172 will be the inputs to the 2:1 multiplexer 176 .
- the reset signal 177 now is reset back to LOW (binary 0) by the application.
- This setting will select the signature S 5 178 in the first signature buffer 172 as the output from the multiplexer 176 . This output will then be concatenated with the sixth frame F 6 179 to form a new frame S 5 ⁇ F 6 180 , which in turn will be the input to the signature generator 181 . The sixth signature S 6 182 will then be generated and output from the signature generator 181 to the second signature buffer 183 as well as the encryptor 184 .
- the above process will generate a current unique digital signature S j based on the current compressed frame F j and the previously generated digital signature S j ⁇ 1 .
- the current unique digital signature S j thus generated will then be used in conjunction with the next compressed frame F j+1 to generate the next unique digital signature S j+1 .
- This process continues over and over again till the entire process is terminated or the Enable/Disable signal 16 in system 10 is changed to “Disable” by the application.
- the reset signal 18 can be set by the ACM 12 per every N frames, where N is an arbitrary positive integer, or set by the ACM 12 whenever a new recording session begins.
- the reset signal 18 can be set by the ACM 12 in a “random” fashion which is known only to the implementation. The advantage of controlling the time to set the reset signal 18 in a random fashion is that it creates the “dynamics” to the signature generation process that is hardly reproduced at the time the media content is ever tampered.
- a fast “False Detection” program can be easily written to detect and identify which frame or frames have been tampered without the need of decoding the entire media content.
- the writing of such a program can be accomplished by one skilled in the art. For example, if a user's interest is only to detect if the media content has ever been tampered, a program can be written to re-generate the unique digital signature per each compressed media frame according to the method described relative to system 10 .
- the identical settings of the reset control signal 18 and the enable/disable control signal 16 in system 10 which are used to generate the original watermarks will now be used by this program. Since no decompression of the media is needed in this case, the detection program can be implemented very fast.
- the re-generated signatures will then be compared with the original signatures which are already stored in the file system 22 . If the original signatures were encrypted, they need to be decrypted before the comparison can take place. A “False” is detected if a miss-compare occurs.
- the False Detection program can also be implemented while the decompression of the media is in progress (i.e., the media is being played back). However in this case, the detection program can only show the detection of the temporal occurrences of tampered frames at the speed of the playback.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Computational Linguistics (AREA)
- Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Acoustics & Sound (AREA)
- Databases & Information Systems (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
A correlation-based system for watermarking continuous digital media at the system application level. It is a post-compression process for watermarking where no a priori knowledge of the underlying compression algorithm is required. Per each compressed media frame, a current unique digital signature is generated based on the data from the current compressed frame plus the digital signature that has been previously generated. The signature thus generated is then used in conjunction with the next compressed frame to generate the next unique digital signature. All digital signatures are correlated according to the above process until a “reset” signal is issued. A new chain of correlated digital signatures is produced by the system with a pre-determined initial signature.
Description
- This is a continuation of U.S. Ser. No. 12/775,845, entitled “Correlation-Based System For Watermarking Continuous Digital Media”, filed May 7, 2010 (U.S. Pat. No. 8,467,567), which is a continuation of U.S. Ser. No. 11/260,906, entitled “Correlation-Based System For Watermarking Continuous Digital Media”, filed Oct. 28, 2005 (U.S. Pat. No. 7,715,587). This invention is related to U.S. Ser. No. 11/262,006, entitled, “Two Level Cross-Correlation Based System for Watermarking Continuous Digital Media”, filed Oct. 28, 2005 (U.S. Pat. No. 7,715,588) by co-applicants, Pan et al, and assigned to the present assignee and is also related to the patent application U.S. Ser. No. 12/775,886 (U.S. Pat No. 8,175,328). U.S. Ser. No. 11/262,006 is incorporated by reference herein in its entirety.
- 1. Field of the Invention
- The present invention relates to multimedia authentication and more particularly to a correlation-based system for watermarking continuous digital media. The primary area for the application of the present invention is the content authentication and ownership identification for continuous digital media that are prone to active attacks such as unauthorized removal and unauthorized embedding. Furthermore, to protect the watermarks from being easily tampered or detected by unauthorized personnel, a method of “correlation” is thus introduced while watermarks are being created.
- 2. Description of the Related Art
- Watermarking has been widely used for the applications of multimedia authentication and copyright protection. Video watermarking, in particular, is unique to other types of media watermarking in that it deals primarily with real-time continuous bitstreams. Many prior art references have focused on watermarking at the video compression level. See for example, D. Simitopoulos, N. Zissis, P. Georgiadis, V. Emmanouilidis, and M. G. Strintzis, “Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD,” Multimedia Systems 9: pp 217-227, 2003; N. J. Mathai, D. Kundur, and A. Sheikholeslami, “Hardware Implementation Perspectives of Digital Video Watermarking Algorithms,” IEEE Transactions on Digital Signal Processing, Vol. 51, No. 4, April 2003; S. W. Kim and S. Suthaharan, “An Entropy Masking Model for Multimedia Content Watermarking,” Proceedings of the 37th Hawaii International Conference on System Sciences, 2004; W. Zhu, Z. Xiong, and Y. Q. Zhang, “Multiresolution Watermarking for Images and Video,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 9, No. 4, June 1999; M. Maes, T. Kalker, J-P. Linnartz, J. Talstra, G. Depovere, and J. Haitsma, “Digital Watermarking for DVD Video Copy Protection,” IEEE Sigmal Processing Magazine, September 2000. Although these methods generally produce good protection by taking into consideration the information contents of the underlying video, they tend to consume extra processing power that can otherwise be used to improve the performance of the encoder and/or reduce the latencies caused by time-critical tasks.
- As will be disclosed below, the present invention provides for an efficient implementation of video watermarking at the system level and yet produces good protection and authentication on the recorded videos.
- In a broad aspect, the present invention is a correlation-based system for watermarking continuous digital media. The correlation-based system includes an application control module (ACM) including a graphical user interface (GUI). The ACM provides: i) an enable/disable control signal in response to a command by the user via the GUI; and, ii) a reset signal. A media encoder receives uncompressed media data from a media source and provides compressed media frames (Fj). A file system captures the compressed media data from the media encoder. A software retrieval module (SRM) retrieves the compressed media frames (Fj) from the file system. A first signature buffer buffers a previously generated signature (Sj−1). A second signature buffer is operatively connected to the first signature buffer for buffering a currently generated unique digital signature (Sj), wherein a transition from the second signature buffer to the first signature buffer occurs when a transition takes place from one frame to the next. A third signature buffer stores a predefined initial signature (S0). A 2:1 multiplexer (MUX) receives an input from the first signature buffer (Sj−1), and another input from the third signature buffer (S0). The reset signal from the ACM is a select control input signal to the 2:1 MUX, wherein one of the two inputs (Sj−1) and (S0) is selected as the output from the 2:1 MUX depending on the logic value of the reset signal. A signature generator is operatively connected to the SRM, to the 2:1 MUX, and to the ACM, for generating a unique digital signature (Sj) based on i) the Fj, ii) the output from the 2:1 MUX, and iii) the status of the enable/disable control signal. The signature generator provides the Sj to the second signature buffer if the enable/disable control signal is set to “enable”. The signature generator provides no signature if the enable/disable control signal is set to “disable”. An encryptor receives the unique digital signature (Sj) and encrypts the unique digital signature if the enable/disable control signal is set to “enable”, and then stores the encrypted unique digital signature (Ej) to the file system. The signature generator provides no signature to the encryptor if the enable/disable control signal is set to “disable”.
- Use of the present invention has several advantages over the prior art. (1) The present watermarking method applies to continuous digital media data such as video or audio rather than still images. (2) The method can be applied directly to the compressed media data. Therefore, the amount of data to be processed is tremendously reduced. (3) No knowledge of the underlying media compression algorithm is required in the present method; hence the computational complexity is greatly reduced. This is contrary to many prior art systems where the watermarking techniques are built on top of the compression algorithms. (4) The present method applies directly to the compressed media frames with variable lengths rather than to the uncompressed frames with a common fixed length. This increases the difficulty of tampering without being detected. (5) A unique digital signature is to be generated per each frame based on the input data from the current compressed frame and the previous signature. No specific digital signature generation algorithm is preferred. The signature thus generated is “correlated” with the previous frame via the previously generated signature. This makes the detection of the piracy very easy, for if any frame has been modified, all the signatures corresponding to that frame and beyond will be wrong. (6) All the digital signatures are “correlatively” generated on and on until it is instructed to “reset” to the initial signature to begin a new correlated signature generation process. The control of the “reset” further creates the dynamics to the pattern of the signatures being generated, which makes the media content even more difficult from being tampered with. (7) The overall watermarking operation of the present invention can be easily implemented at the Application level, which requires very minimum system resource and therefore can be easily integrated with the entire system. (8) A fast “False Detection” program can be easily written to detect and identify which frame or frames have been tampered without the need of decoding the entire media content—a tremendous saving in time can be achieved.
- The watermarking technique of the present invention is commonly applied to digital media such as video and audio. However, the same method is applicable to any digital media that are continuous in nature.
-
FIG. 1 is a flow diagram illustrating the correlation-based system for watermarking continuous digital media of the present invention. -
FIG. 2 is a flow diagram illustrating an example of the operation of the present invention. -
FIGS. 3A-3F illustrate theFIG. 2 example with step-by-step details. - Referring now to the drawings and the characters of reference marked thereon,
FIG. 1 illustrates a preferred embodiment of the correlation-based system for watermarking continuous digital media of the present invention, designated generally as 10. This correlation-basedsystem 10 includes an application control module (ACM) 12 that includes a graphical user interface (GUI) 14. TheACM 12 provides an enable/disablecontrol signal 16 and areset signal 18 in response to a command by the user via theGUI 14 andfile system information 20, respectively. TheACM 12 may be embodied as part of application software which allows users to provide control and configuration to a typical stationary Digital Video Recording (DVR) system or a completely embedded control software in a mobile DVR system which is generally installed and operated in a mobile vehicle such as a police car or a bus. - A
file system 22 captures compressedcontinuous media data 23 from the Media Encoder (ME) 25. The compressed continuous media data is generally embodied in forms of media frames (Fj). TheME 25 receives theuncompressed media data 29 from a media source such as acamera 27. Theuncompressed media data 29 may be audio/video data, solely video data or solely audio data. Furthermore, it may be in analog form or digital form. If it is in analog form themedia encoder 25 typically provides a conversion from analog to digital. Similarly, the compressed media data may be audio/video data, solely video data or solely audio data. - A software retrieval module (SRM) 26 retrieves the compressed media frames (Fj) from the
file system 22, as indicated bynumeral designation 28. To retrieve the frames, theSRM 26 must first perform a “File Open” function call to theFile System 22 to obtain a File Pointer which points to the location of the file containing the header associated with the compressed media data. TheSRM 26 then reads the length of the compressed media frame Fj based on this File Pointer and calculates the Frame Pointer pointing to the location of the frame Fj in thefile system 22. TheSRM 26 is now ready to fetch the frame data Fj based on the calculated Frame Pointer. Although theSRM 26 described above is shown as a stand alone software module inFIG. 1 , it is not necessarily to be included as a dedicated software module in the entire system. For example, depending on the implementation, the same functions described above for theSRM 26 can be embedded as an integral part of other software modules. - A
first Signature Buffer 30 buffers the previously generated signature (Sj−1). Asecond Signature Buffer 34 buffers the currently generated unique digital signature (Sj). Thus a signature transition Sj→Sj−1 takes place from thesecond Signature Buffer 34 to thefirst Signature Buffer 30 when a transition takes place from frame (Fj) to frame (Fj+1). - A
third Signature Buffer 38 stores a predefined initial signature (S0). Both of the signature (S0) in thethird Buffer 38 and the signature (Sj−1) in thefirst Buffer 30 are the two inputs to a 2:1 multiplexer (MUX) 40. One and only one of these inputs will be selected as theoutput 41 of theMUX 40 determined by the logic level of thereset signal 18 from theACM 12. If thereset signal 18 is set to HIGH (=1), the initial signature (S0) in the third Buffer will be selected as theoutput 41 of theMUX 40. If thereset signal 18 is reset to LOW (=0), the previously generated signature (Sj−1) in thefirst Buffer 30 will be selected as theoutput 41 of theMUX 40. The logic level of thereset signal 18 is normally set to HIGH at the beginning of the entire operation and dropped down to LOW immediately after the very first signature is generated and retained at the LOW level for the rest of the operation so that the previously generated signature (Sj−1) can always participate in the signature generation process for the current signature (Sj). Depending on the implementation, thereset signal 18 can be set to HIGH as many times as desired during the course of the operation. - A
signal generator 42 is operatively connected to theSRM 26, the 2:1MUX 40, and to theACM 12, for generating a current unique digital signature (Sj) based on the current compressed frame Fj, the previously generated digital signature Sj−1 and the status of the enable/disablecontrol signal 16. If the enable/disablecontrol signal 16 is set to Enable by theACM 12, thesignature generator 42 will operate normally. However, if the enable/disablecontrol signal 16 is set to Disable by theACM 12, thesignature generator 42 will be shut down and no signature will be generated, thus no watermark will be created. The setting of the enable/disablecontrol signal 16 is normally done through a static configuration at the beginning of a recording session. However, a dynamic “re-configuration” of the enable/disablecontrol signal 16 is possible (while a recording session is in progress), providing the new settings are properly kept by the system. Thesignature generator 42 provides thecurrent signature S j 36 to thesecond signature buffer 34 if the enable/disablecontrol signal 16 is set to Enable. For a production level implementation, any signature generation algorithm, such as the Cyclic Redundancy Code (CRC), can be used in thesignature generator 42. - An
encryptor 44 receives the unique digital signature (Sj) 35 and encrypts the unique digital signature if the enable/disablecontrol signal 16 is set to Enable. Any suitable reversible encryption algorithm (e.g., 64/128-bit AES/DES) can be employed in theencryptor 44. The encrypted unique digital signature (Ej) 24 is stored in thefile system 22. Although (for security reasons) theencryptor 44 is a preferred implementation, it may not constitute a critical element of the present invention. Therefore its implementation may be optionally eliminated. If this is the case, then the unique digital signature (Sj) 37 generated by thesignature generator 42 will be stored to thefile system 22 directly. - Referring now to
FIG. 2 andFIGS. 3A-3F ,FIG. 2 shows an example during the operation of the present system, designated generally as 55; and,FIGS. 3A-3F illustrate theFIG. 2 example with step-by-step details, designated generally as 70, 90, 110, 130, 150, and 170, respectively. As depicted inFIG. 2 , both video frames 60 and thesignatures 61 are correlated through a 2:1multiplexer 56, three buffers: thefirst signature buffer 57, thesecond signature buffer 58, thethird signature buffer 59, and thesignature generator 63. Aninitial signature S 0 62 will be preloaded to thethird signature buffer 59 by the application. The generatedsignatures 64 from thesignature generator 63 will be sent to the encryptor, as shown bynumeral designation 65, as well as stored in thesecond signature buffer 58. - Referring now to
FIG. 3A , in an initial step, designated generally as 70, before the entire operation starts, thefirst signature buffer 71, which is used to store the previously generated signature, will contain some value XX 72 (which is irrelevant to the operation). At the very beginning of the process, bothS 0 73 in thethird buffer 74 andXX 72 in thefirst buffer 71 are the inputs to the 2:1multiplexer 75. Thereset signal 76 is set to HIGH (binary 1) initially by the application. This setting will select theinitial signature S 0 77 as the output from themultiplexer 75. This output will then be concatenated with thefirst frame F 1 78 to form a new frame S0∥F1 79, which in turn will be the input to thesignature generator 80. Thefirst signature S 1 81 will then be generated and output from thesignature generator 80 to thesecond signature buffer 82 as well as theencryptor 83. - Referring now to
FIG. 3B , in a transition step designated generally as 90, as soon as the generation of the first signature S1 is completed, as shown inFIG. 3A , the process transitions from the first frame to the second frame. During this transition, thesignature S 1 91 residing previously in thesecond signature buffer 103 will be stored to thefirst signature buffer 92. Both of the signatures S0 93 in thethird signature buffer 94 andS 1 95 in thefirst signature buffer 92 will be the inputs to the 2:1multiplexer 96. Theapplication control module 12 will then reset thereset signal 97 to LOW (binary 0). This setting will select thesignature S 1 98 in thefirst signature buffer 92 as the output from themultiplexer 96. This output will then be concatenated with thesecond frame F 2 99 to form a new frame S1∥F2 100, which in turn will be the input to thesignature generator 101. Thesecond signature S 2 102 will then be generated and output from thesignature generator 101 to thesecond signature buffer 103 as well as theencryptor 104. - Referring now to
FIG. 3C , in a transition step designated generally as 110, as soon as the generation of the second signature S2 is completed, as shown inFIG. 3B , the process transitions from the second frame to the third frame, as shown inFIG. 3C . During this transition, thesignature S 2 111 residing previously in thesecond signature buffer 123 will be stored to thefirst signature buffer 112. Both of the signatures S0 113 in thethird signature buffer 114 andS 2 115 in thefirst signature buffer 112 will be the inputs to the 2:1multiplexer 116. Thereset signal 117 retains at LOW (binary 0). This setting will select thesignature S 2 118 in thefirst signature buffer 112 as the output from themultiplexer 116. This output will then be concatenated with thethird frame F 3 119 to form a new frame S2∥F3 120, which in turn will be the input to thesignature generator 121. Thethird signature S 3 122 will then be generated and output from thesignature generator 121 to thesecond signature buffer 123 as well as theencryptor 124. - Referring now to
FIG. 3D , in a transition step, designated generally as 130, as soon as the generation of the third signature S3 is completed, as shown inFIG. 3C , the process transitions from the third frame to the forth frame, as is shown inFIG. 3D . During this transition, thesignature S 3 131 residing previously in thesecond signature buffer 143 will be stored to thefirst signature buffer 132. Both of the signatures S0 133 in thethird signature buffer 134 andS 3 135 in thefirst signature buffer 132 will be the inputs to the 2:1multiplexer 136. Thereset signal 137 retains at LOW (binary 0). This setting will select thesignature S 3 138 in thefirst signature buffer 132 as the output from themultiplexer 136. This output will then be concatenated with theforth frame F 4 139 to form a new frame S3∥F4 140, which in turn will be the input to thesignature generator 141. Thefourth signature S 4 142 will then be generated and output from thesignature generator 141 to thesecond signature buffer 143 as well as theencryptor 144. - Referring to
FIG. 3E , in a transition step, designated generally as 150, as soon as the generation of the forth signature S4 is completed, as shown inFIG. 3D , the process transitions from the forth frame to the fifth frame, as is shown inFIG. 3E . During this transition, thesignature S 4 151 residing previously in thesecond signature buffer 163 will be stored to thefirst signature buffer 152. Both of the signatures S0 153 in thethird signature buffer 154 andS 4 155 in thefirst signature buffer 152 will be the inputs to the 2:1multiplexer 156. Thereset signal 157 now is set back to HIGH (binary 1) by the application. This setting will select theinitial signature S 0 158 in thethird signature buffer 154 as the output from themultiplexer 156. This output will then be concatenated with thefifth frame F 5 159 to form a new frame S0∥F5 160, which in turn will be the input to thesignature generator 161. Thefifth signature S 5 162 will then be generated and output from thesignature generator 161 to thesecond signature buffer 163 as well as theencryptor 164. - Referring to
FIG. 3F , in a transition step, designated generally as 170, as soon as the generation of the fifth signature S5 is completed, as shown inFIG. 3E , the process transitions from the fifth frame to the sixth frame, as is shown inFIG. 3F . During this transition, thesignature S 5 171 residing previously in thesecond signature buffer 183 will be stored to thefirst signature buffer 172. Both of the signatures S0 173 in thethird signature buffer 174 andS 5 175 in thefirst signature buffer 172 will be the inputs to the 2:1multiplexer 176. Thereset signal 177 now is reset back to LOW (binary 0) by the application. This setting will select thesignature S 5 178 in thefirst signature buffer 172 as the output from themultiplexer 176. This output will then be concatenated with thesixth frame F 6 179 to form a new frame S5∥F6 180, which in turn will be the input to thesignature generator 181. Thesixth signature S 6 182 will then be generated and output from thesignature generator 181 to thesecond signature buffer 183 as well as theencryptor 184. - Generally speaking, the above process will generate a current unique digital signature Sj based on the current compressed frame Fj and the previously generated digital signature Sj−1. The current unique digital signature Sj thus generated will then be used in conjunction with the next compressed frame Fj+1 to generate the next unique digital signature Sj+1. This process continues over and over again till the entire process is terminated or the Enable/Disable
signal 16 insystem 10 is changed to “Disable” by the application. - Although the system of the present invention has been described as having the
file system information 20 being provided to theACM 12 and theACM 12 providing thereset signal 18 in response to the file system information there are other potential implementations. For example, thereset signal 18 can be set by theACM 12 per every N frames, where N is an arbitrary positive integer, or set by theACM 12 whenever a new recording session begins. In general, thereset signal 18 can be set by theACM 12 in a “random” fashion which is known only to the implementation. The advantage of controlling the time to set thereset signal 18 in a random fashion is that it creates the “dynamics” to the signature generation process that is hardly reproduced at the time the media content is ever tampered. - As noted above, a fast “False Detection” program can be easily written to detect and identify which frame or frames have been tampered without the need of decoding the entire media content. The writing of such a program can be accomplished by one skilled in the art. For example, if a user's interest is only to detect if the media content has ever been tampered, a program can be written to re-generate the unique digital signature per each compressed media frame according to the method described relative to
system 10. The identical settings of thereset control signal 18 and the enable/disablecontrol signal 16 insystem 10 which are used to generate the original watermarks will now be used by this program. Since no decompression of the media is needed in this case, the detection program can be implemented very fast. The re-generated signatures will then be compared with the original signatures which are already stored in thefile system 22. If the original signatures were encrypted, they need to be decrypted before the comparison can take place. A “False” is detected if a miss-compare occurs. The False Detection program can also be implemented while the decompression of the media is in progress (i.e., the media is being played back). However in this case, the detection program can only show the detection of the temporal occurrences of tampered frames at the speed of the playback. - Other embodiments and configurations may be devised without departing from the spirit of the invention and the scope of the appended claims.
Claims (18)
1. A correlation-based system for watermarking continuous digital media, comprising:
a) an application control module (ACM) including a graphical user interface (GUI), said ACM for providing: i) an enable/disable control signal in response to a command by the user via the GUI; and, ii) a reset signal;
b) a media encoder for receiving uncompressed media data from a media source and providing compressed media frames (Fj);
c) a file system for capturing said compressed media data from said media encoder;
d) a software retrieval module (SRM) for retrieving said compressed media frames (Fj) from said file system;
e) a first signature buffer for buffering a previously generated signature (Sj−1);
f) a second signature buffer operatively connected to said first signature buffer for buffering a currently generated unique digital signature (Sj), wherein a transition from said second signature buffer to said first signature buffer occurs when a transition takes place from one frame to the next;
g) a third signature buffer for storing a predefined initial signature (S0);
h) a 2:1 multiplexer (MUX) for receiving an input from said first signature buffer (Sj−1), and another input from said third signature buffer (S0), said reset signal from said ACM being a select control input signal to said 2:1 MUX, wherein one of the two inputs (Sj−1) and (S0) are selected as the output from said 2:1 MUX depending on the logic value of said reset signal;
i) a signature generator operatively connected to said SRM, to said 2:1 MUX, and to said ACM, for generating a unique digital signature (Sj) based on 1) said Fj, 2) said output from said 2:1 MUX, and 3) the status of said enable/disable control signal, wherein said signature generator provides said Sj to said second signature buffer if said enable/disable control signal is set to “enable”, said signature generator providing no signature if said enable/disable control signal is set to “disable”; and,
j) an encryptor for receiving said unique digital signature (Sj) and for encrypting said unique digital signature if said enable/disable control signal is set to “enable”, said signature generator providing no signature to said encryptor if said enable/disable control signal is set to “disable”, the encrypted unique digital signature (Ej) being stored in said file system.
2. The correlation-based system of claim 1 wherein said file system provides file system information to said ACM, said ACM providing said reset signal in response to said file system information.
3. The correlation-based system of claim 1 wherein said uncompressed media data comprises analog data.
4. The correlation-based system of claim 1 wherein said uncompressed media data comprises digital data.
5. The correlation-based system of claim 1 wherein said compressed media data comprises digital audio/video media data.
6. The correlation-based system of claim 1 wherein said compressed media data comprises digital video media data.
7. The correlation-based system of claim 1 wherein said compressed media data comprises digital audio media data.
8. The correlation-based system of claim 1 wherein said file system comprises a file system that stores files containing continuous media data.
9. The correlation-based system of claim 1 wherein said signature generator generates a unique digital signature of a desired length in binary bits based on the desired binary input data.
10. The correlation-based system of claim 1 wherein said initial signature comprises a binary data of any number of binary bits that is predetermined by the underlying implementation.
11. The correlation-based system of claim 1 wherein said reset signal provides control to select either said predetermined initial signature (S0) or said previously generated signature (Sj−1) to participate in the current signature generation process in said signature generator.
12. The correlation-based system of claim 1 wherein said encryptor comprises a reversible encryption process/algorithm for encrypting said unique digital signature (Sj) and providing said encrypted unique digital signature (Ej).
13. A correlation-based method for watermarking continuous digital media, comprising the steps of:
a) i) providing an enable/disable control signal in response to a command by a user via a graphical user interface (GUI); and, ii) providing a reset signal, said enable/disable control signal and said reset signal being provided by an application control module (ACM) including said GUI;
b) receiving uncompressed media data from a media source and providing compressed media frames (Fj);
c) capturing said compressed media data in a file system;
d) retrieving said compressed media frames (Fj);
e) buffering a previously generated signature (Sj−1) utilizing a first signature buffer;
f) buffering a currently generated unique digital signature (Sj) utilizing a second signature buffer, wherein a transition from said second signature buffer to said first signature buffer occurs when a transition takes place from one frame to the next;
g) storing a predefined initial signature (S0) utilizing a third signature buffer;
h) receiving an input from said first signature buffer (Sj−1), and another input from said third signature buffer (S0) utilizing a 2:1 multiplexer (MUX), said reset signal from said ACM being a select control input signal to said 2:1 MUX, wherein one of the two inputs (Sj−1) and (S0) are selected as the output from said 2:1 MUX depending on the logic value of said reset signal;
i) generating a unique digital signature (Sj) based on 1) said Fj, 2) said output from said 2:1 MUX, and 3) the status of said enable/disable control signal, said Sj utilizing a signature generator, wherein said signature generator provides said Sj to said second signature buffer if said enable/disable control signal is set to “enable”, said signature generator providing no signature if said enable/disable control signal is set to “disable”; and
j) receiving said unique digital signature (Sj) and encrypting said unique digital signature if said enable/disable control signal is set to “enable”, said signature generator providing no signature for encryption if said enable/disable control signal is set to “disable”, the encrypted unique digital signature (Ej) being stored in said file system.
14. The correlation-based method of claim 13 further including the step of utilizing said file system to provide file system information to said ACM, said ACM providing said reset signal in response to said file system information.
15. The correlation-based method of claim 13 wherein said step of generating a unique digital signature comprises generating a unique digital signature of a desired length in binary bits based on the desired binary input data.
16. A correlation-based system for watermarking continuous digital media at the system application level, comprising:
a) means for generating a current unique digital signature based on the data from a current compressed frame and a digital signature that has been previously generated; and,
b) means for using said generated current unique digital signature in conjunction with a next compressed frame to generate a next unique digital signature,
wherein subsequent digital signatures are correlated by the above process until a “reset” signal is issued, a new chain of correlated digital signatures being produced by the system with a pre-determined initial signature, thereby providing a post-compression means for watermarking where no a priori knowledge of the underlying compression algorithm is required.
17. (canceled)
18. (canceled)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/920,721 US20130343725A1 (en) | 2005-10-28 | 2013-06-18 | Correlation-based system for watermarking continuous digital media |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/260,906 US7715587B2 (en) | 2005-10-28 | 2005-10-28 | Correlation-based system for watermarking continuous digital media |
US12/775,845 US8467567B2 (en) | 2005-10-28 | 2010-05-07 | Correlation-based system for watermarking continuous digital media |
US13/920,721 US20130343725A1 (en) | 2005-10-28 | 2013-06-18 | Correlation-based system for watermarking continuous digital media |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/775,845 Continuation US8467567B2 (en) | 2005-10-28 | 2010-05-07 | Correlation-based system for watermarking continuous digital media |
Publications (1)
Publication Number | Publication Date |
---|---|
US20130343725A1 true US20130343725A1 (en) | 2013-12-26 |
Family
ID=37996326
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/260,906 Expired - Fee Related US7715587B2 (en) | 2005-10-28 | 2005-10-28 | Correlation-based system for watermarking continuous digital media |
US12/775,845 Expired - Fee Related US8467567B2 (en) | 2005-10-28 | 2010-05-07 | Correlation-based system for watermarking continuous digital media |
US13/920,721 Abandoned US20130343725A1 (en) | 2005-10-28 | 2013-06-18 | Correlation-based system for watermarking continuous digital media |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/260,906 Expired - Fee Related US7715587B2 (en) | 2005-10-28 | 2005-10-28 | Correlation-based system for watermarking continuous digital media |
US12/775,845 Expired - Fee Related US8467567B2 (en) | 2005-10-28 | 2010-05-07 | Correlation-based system for watermarking continuous digital media |
Country Status (1)
Country | Link |
---|---|
US (3) | US7715587B2 (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7715587B2 (en) * | 2005-10-28 | 2010-05-11 | Lawrence N. Ginsberg | Correlation-based system for watermarking continuous digital media |
TW200832276A (en) * | 2007-01-31 | 2008-08-01 | Benq Corp | Method and related apparatus for hiding data inside video signals and transmitting the video signals to a display device |
US8904184B2 (en) * | 2008-12-10 | 2014-12-02 | At&T Intellectual Property I, Lp | Certification of authenticity of media signals |
JP2011059216A (en) * | 2009-09-08 | 2011-03-24 | Renesas Electronics Corp | Display device and display control method |
US20110286533A1 (en) * | 2010-02-23 | 2011-11-24 | Fortney Douglas P | Integrated recording and video on demand playback system |
US9767840B2 (en) * | 2011-08-18 | 2017-09-19 | Apple Inc. | Securing protected content during video playback |
US10097951B2 (en) * | 2014-03-31 | 2018-10-09 | Mcafee, Llc | Provable geo-location |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050050332A1 (en) * | 1999-06-08 | 2005-03-03 | Intertrust Technologies Corporation | Methods and systems for encoding and protecting data using digital signature and watermarking techniques |
US20060153296A1 (en) * | 2003-09-12 | 2006-07-13 | Kevin Deng | Digital video signature apparatus and methods for use with video program identification systems |
US20100040255A1 (en) * | 1995-05-08 | 2010-02-18 | Rhoads Geoffrey B | Processing Data Representing Video and Audio and Methods Related Thereto |
US7707422B2 (en) * | 2003-04-25 | 2010-04-27 | Marktek Inc. | Method for embedding watermark into an image and digital video recorder using said method |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7570641B2 (en) * | 2005-08-23 | 2009-08-04 | Macrovision Corporation | Techniques for watermarking and distributing content |
US7715587B2 (en) * | 2005-10-28 | 2010-05-11 | Lawrence N. Ginsberg | Correlation-based system for watermarking continuous digital media |
US7715588B2 (en) * | 2005-10-28 | 2010-05-11 | Lawrence N. Ginsberg | Two level cross-correlation based system for watermarking continuous digital media |
-
2005
- 2005-10-28 US US11/260,906 patent/US7715587B2/en not_active Expired - Fee Related
-
2010
- 2010-05-07 US US12/775,845 patent/US8467567B2/en not_active Expired - Fee Related
-
2013
- 2013-06-18 US US13/920,721 patent/US20130343725A1/en not_active Abandoned
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100040255A1 (en) * | 1995-05-08 | 2010-02-18 | Rhoads Geoffrey B | Processing Data Representing Video and Audio and Methods Related Thereto |
US20050050332A1 (en) * | 1999-06-08 | 2005-03-03 | Intertrust Technologies Corporation | Methods and systems for encoding and protecting data using digital signature and watermarking techniques |
US7707422B2 (en) * | 2003-04-25 | 2010-04-27 | Marktek Inc. | Method for embedding watermark into an image and digital video recorder using said method |
US20060153296A1 (en) * | 2003-09-12 | 2006-07-13 | Kevin Deng | Digital video signature apparatus and methods for use with video program identification systems |
Non-Patent Citations (1)
Title |
---|
Maes, et al. "Digital Watermarking for DVD Video Copy Protection." IEEE Signal Processing Magazine, September 2000, pp.1-10 * |
Also Published As
Publication number | Publication date |
---|---|
US20070098210A1 (en) | 2007-05-03 |
US20100220858A1 (en) | 2010-09-02 |
US8467567B2 (en) | 2013-06-18 |
US7715587B2 (en) | 2010-05-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20130343725A1 (en) | Correlation-based system for watermarking continuous digital media | |
Lin et al. | Generating robust digital signature for image/video authentication | |
JP3768705B2 (en) | Digital watermark embedding device, output control device, and computer-readable storage medium | |
JP4298499B2 (en) | Apparatus and method for watermarking digital video | |
US20150139480A1 (en) | Cross-correlation based system for watermarking media | |
Huang et al. | High-capacity reversible data hiding in encrypted image based on specific encryption process | |
JP4785317B2 (en) | Transmarking watermark embedding function as rendering command and watermark embedding based on features of multimedia signal | |
US6449378B1 (en) | Data processing apparatus and method and storage medium | |
US7801326B2 (en) | Digital watermark and film mark | |
US7114073B2 (en) | Digital contents generating apparatus and digital contents reproducing apparatus | |
JP2001309162A (en) | Method for applying digital watermark to data file | |
Yin et al. | A semi-fragile watermarking system for MPEG video authentication | |
CN100581100C (en) | Method and system of playback for preventing skip over special contents fragment in digital media stream | |
Cheddad et al. | Enhancing steganography in digital images | |
JP2003536110A (en) | Watermark detector | |
A Hasso et al. | A new tamper detection algorithm for video | |
JP2005217598A (en) | Device for embedding digital watermark, digital watermark detector, method for embedding digital watermark, and method for detecting digital watermark | |
CN116437019A (en) | Ciphertext domain reversible information hiding method of all-0 row and all-0 column codes | |
JP2010147749A (en) | Moving image distribution module, moving-image receiving module, and moving-image transmission system | |
US7606426B1 (en) | Image processing apparatus and method and storage medium | |
Shiu et al. | Reversible data hiding in permutation-based encrypted images with strong privacy | |
JP3722646B2 (en) | Method for embedding watermark information in data and program recording medium | |
JP2014175757A (en) | Digital watermark processing system for generating digital watermark by coupling divided elements, server, program and method | |
Kanphade et al. | Forward modified histogram shifting based reversible watermarking with reduced pixel shifting and high embedding capacity | |
US7356159B2 (en) | Recording and reproduction apparatus, recording and reproduction method, recording and reproduction program for imperceptible information to be embedded in digital image data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |