US20230005094A1 - Digital watermarking - Google Patents
Digital watermarking Download PDFInfo
- Publication number
- US20230005094A1 US20230005094A1 US17/931,534 US202217931534A US2023005094A1 US 20230005094 A1 US20230005094 A1 US 20230005094A1 US 202217931534 A US202217931534 A US 202217931534A US 2023005094 A1 US2023005094 A1 US 2023005094A1
- Authority
- US
- United States
- Prior art keywords
- digital watermark
- frame
- media
- bits
- frames
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 claims abstract description 64
- 238000012545 processing Methods 0.000 claims description 38
- 230000000007 visual effect Effects 0.000 claims description 8
- 230000003068 static effect Effects 0.000 claims description 2
- 238000003780 insertion Methods 0.000 claims 2
- 230000037431 insertion Effects 0.000 claims 2
- 230000006870 function Effects 0.000 description 16
- 238000004891 communication Methods 0.000 description 7
- 230000001413 cellular effect Effects 0.000 description 3
- 238000001514 detection method Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000004880 explosion Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000012015 optical character recognition Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
- G10L19/018—Audio watermarking, i.e. embedding inaudible data in the audio signal
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0085—Time domain based watermarking, e.g. watermarks spread over several images
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/46—Embedding additional information in the video signal during the compression process
- H04N19/467—Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0051—Embedding of the watermark in the spatial domain
Definitions
- the present disclosure relates generally to data security, and relates more particularly to devices, non-transitory computer-readable media, and methods for digital watermarking.
- Digital watermarks comprise specific types of markers that may be embedded in noise tolerant signals such as image, video, audio, or other signals (generally “media signals”).
- the markers typically hide information in carrier signals that carry the media signals.
- digital watermarks are commonly used to protect streaming media against unauthorized use and/or to verify the authenticity of the streaming media to users.
- multiple “screener” copies of a film that has been nominated for an award may be distributed to voters who will vote on the award, and each screener copy may bear a different, unique digital watermark.
- the screener copy can be traced back to the original party to whom the screener copy was provided based on the unique digital watermark, allowing the owners of the film to easily identify any points of compromise in the chain of distribution.
- FIG. 1 illustrates an example system in which examples of the present disclosure for digital watermarking may operate
- FIG. 2 illustrates a flowchart of an example method for inserting a digital watermark in a stream of data, in accordance with the present disclosure
- FIG. 3 illustrates one example of a digital watermark that changes location from one frame to another frame within a signal
- FIG. 4 illustrates an example of a computing device, or computing system, specifically programmed to perform the steps, functions, blocks, and/or operations described herein.
- a method for inserting a digital watermark in a signal includes obtaining the signal comprising a plurality of frames, inserting a first digital watermark in a first frame of the plurality of frames, inserting a second digital watermark in a second frame of the plurality of frames, wherein the second digital watermark differs from the first digital watermark in at least one way selected from a group of: a location within a respective frame, a number of bits, a pattern of bits, and a number of bits of a noise, and outputting a watermarked signal including the first digital watermark in the first frame and the second digital watermark in the second frame.
- a non-transitory computer-readable medium may store instructions which, when executed by a processing system in a communications network, cause the processing system to perform operations.
- the operations may include obtaining the signal comprising a plurality of frames, inserting a first digital watermark in a first frame of the plurality of frames, inserting a second digital watermark in a second frame of the plurality of frames, wherein the second digital watermark differs from the first digital watermark in at least one way selected from a group of: a location within a respective frame, a number of bits, a pattern of bits, and a number of bits of a noise, and outputting a watermarked signal including the first digital watermark in the first frame and the second digital watermark in the second frame.
- a device may include a processing system including at least one processor and a non-transitory computer-readable medium storing instructions which, when executed by the processing system when deployed in a communications network, cause the processing system to perform operations.
- the operations may include obtaining the signal comprising a plurality of frames, inserting a first digital watermark in a first frame of the plurality of frames, inserting a second digital watermark in a second frame of the plurality of frames, wherein the second digital watermark differs from the first digital watermark in at least one way selected from a group of: a location within a respective frame, a number of bits, a pattern of bits, and a number of bits of a noise, and outputting a watermarked signal including the first digital watermark in the first frame and the second digital watermark in the second frame.
- digital watermarks comprise specific types of markers that may be embedded in noise tolerant signals such as image, video, audio, or other signals (generally “media signals”).
- the markers typically hide information in carrier signals that carry the media signals.
- digital watermarks are commonly used to protect streaming media against unauthorized use and/or to verify the authenticity of the streaming media to users.
- conventional digital watermarks tend to be obvious and intrusive, especially in video media. The presence of a digital watermark may therefore be distracting from a user perspective (e.g., a viewer of watermarked film) and may undesirably compromise the artistic integrity of the watermarked media from a creator perspective (e.g., a director of a watermarked film).
- the digital watermark may still fail to protect the watermarked media and/or the users of the watermarked media. For instance, many digital watermarks can be easily replicated or even washed out of a media stream when the media stream is transmitted and presented without proper authorization.
- a party receiving a watermarked media may be unable to leverage the watermark as proof that the watermarked media has not been tampered with, due to a functional gap in software and/or in a reference data transfer. The inability to verify that the watermarked media has not been tampered with may leave the receiving party vulnerable to software and other attacks.
- each of the watermark concealment techniques involves varying some dimensional characteristic of a signal containing the media over time. For instance, the location of the digital watermark within a frame of the signal, the number of bits of the digital watermark, the pattern of bits in the digital watermark, and/or the number of bits of a noise obfuscating the digital watermark may be varied over time in the signal (e.g., varied from one frame of the signal to another frame of the signal). Employing a combination of these concealment techniques may help to ensure that the digital watermark is difficult to detect (and, therefore, remove from the signal).
- the greater the number of concealment techniques that are employed e.g., the greater the number of dimensional characteristics of the signal that are varied over time
- the digital watermark may be encrypted to further guard against removal of the digital watermark from the signal.
- a digital watermark of the present disclosure may be used in any of the manners that a conventional digital watermark may be used, including copyright protection, source tracking, broadcast monitoring, video and/or audio authentication, fraud detection, identification card security, social network content management, and other applications. These and other aspects of the present disclosure are discussed in greater detail below in connection with the examples of FIGS. 1 - 4 .
- FIG. 1 illustrates an example system 100 in which examples of the present disclosure for digital watermarking may operate.
- the system 100 may include any one or more types of communication networks, such as a traditional circuit switched network (e.g., a public switched telephone network (PSTN)) or a packet network such as an Internet Protocol (IP) network (e.g., an IP Multimedia Subsystem (IMS) network), an asynchronous transfer mode (ATM) network, a wired network, a wireless network, and/or a cellular network (e.g., 2G-5G, a long term evolution (LTE) network, and the like) related to the current disclosure.
- IP Internet Protocol
- IMS IP Multimedia Subsystem
- ATM asynchronous transfer mode
- wired network e.g., a wireless network
- LTE long term evolution
- cellular network e.g., 2G-5G, a long term evolution (LTE) network, and the like
- IP network is broadly defined as a network that uses Internet Protocol to exchange data packets
- the system 100 may comprise a core network 102 .
- the core network 102 may be in communication with one or more access networks 120 and 122 , and with the Internet 124 .
- the core network 102 may functionally comprise a fixed mobile convergence (FMC) network, e.g., an IP Multimedia Subsystem (IMS) network.
- FMC fixed mobile convergence
- IMS IP Multimedia Subsystem
- the core network 102 may functionally comprise a telephony network, e.g., an Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) backbone network utilizing Session Initiation Protocol (SIP) for circuit-switched and Voice over Internet Protocol (VoIP) telephony services.
- IP/MPLS Internet Protocol/Multi-Protocol Label Switching
- SIP Session Initiation Protocol
- VoIP Voice over Internet Protocol
- the core network 102 may include at least one application server (AS) 104 , at least one database (DB) 106 , and a plurality of edge routers 128 - 130 .
- AS application server
- DB database
- edge routers 128 - 130 a plurality of edge routers 128 - 130 .
- FIG. 1 various additional elements of the core network 102 are omitted from FIG. 1 .
- the access networks 120 and 122 may comprise Digital Subscriber Line (DSL) networks, public switched telephone network (PSTN) access networks, broadband cable access networks, Local Area Networks (LANs), wireless access networks (e.g., an IEEE 802.11/Wi-Fi network and the like), cellular access networks, 3 rd party networks, and the like.
- DSL Digital Subscriber Line
- PSTN public switched telephone network
- LANs Local Area Networks
- wireless access networks e.g., an IEEE 802.11/Wi-Fi network and the like
- cellular access networks e.g., 3 rd party networks, and the like.
- the operator of the core network 102 may provide a cable television service, an IPTV service, or any other types of telecommunication services to subscribers via access networks 120 and 122 .
- the access networks 120 and 122 may comprise different types of access networks, may comprise the same type of access network, or some access networks may be the same type of access network and other may be different types of access networks.
- the core network 102 may be operated by a telecommunication network service provider (e.g., an Internet service provider, or a service provider who provides Internet services in addition to other telecommunication services).
- the core network 102 and the access networks 120 and 122 may be operated by different service providers, the same service provider or a combination thereof, or the access networks 120 and/or 122 may be operated by entities having core businesses that are not related to telecommunications services, e.g., corporate, governmental, or educational institution LANs, and the like.
- the access network 120 may be in communication with one or more user endpoint devices 108 and 110 .
- the access network 122 may be in communication with one or more user endpoint devices 112 and 114 .
- the access networks 120 and 122 may transmit and receive communications between the user endpoint devices 108 , 110 , 112 , and 114 , between the user endpoint devices 108 , 110 , 112 , and 114 , the server(s) 126 , the AS 104 , other components of the core network 102 , devices reachable via the Internet in general, and so forth.
- each of the user endpoint devices 108 , 110 , 112 , and 114 may comprise any single device or combination of devices that may comprise a user endpoint device.
- the user endpoint devices 108 , 110 , 112 , and 114 may each comprise a mobile device, a cellular smart phone, a gaming console, a set top box, a laptop computer, a tablet computer, a desktop computer, an application server, a bank or cluster of such devices, and the like.
- one or more servers 126 may be accessible to user endpoint devices 108 , 110 , 112 , and 114 via Internet 124 in general.
- the server(s) 126 may be associated with Internet content providers, e.g., entities that provide content (e.g., new, blogs, videos, music, files, or the like) in the form of websites to users over the Internet 124 .
- some of the servers 126 may comprise content servers, e.g., servers that store content such as images, text, video, and the like which may be served to web browser applications executing on the user endpoint devices 108 , 110 , 112 , and 114 in the form of websites.
- the AS 104 may be configured to provide one or more operations or functions in connection with examples of the present disclosure for digital watermarking, as described herein.
- the AS 104 may comprise one or more physical devices, e.g., one or more computing systems or servers, such as computing system 400 depicted in FIG. 4 , and may be configured as described below to insert digital watermarks into media streams.
- the terms “configure,” and “reconfigure” may refer to programming or loading a processing system with computer-readable/computer-executable instructions, code, and/or programs, e.g., in a distributed or non-distributed memory, which when executed by a processor, or processors, of the processing system within a same device or within distributed devices, may cause the processing system to perform various functions.
- Such terms may also encompass providing variables, data values, tables, objects, or other data structures or the like which may cause a processing system executing computer-readable instructions, code, and/or programs to function differently depending upon the values of the variables or other data structures that are provided.
- a “processing system” may comprise a computing device including one or more processors, or cores (e.g., as illustrated in FIG. 4 and discussed below) or multiple computing devices collectively configured to perform various steps, functions, and/or operations in accordance with the present disclosure.
- the AS 104 may be configured to retrieve media streams from a storage device, such as the database (DB) 106 .
- the media streams may include video streams (e.g., films, television shows, sports broadcasts, music videos, or the like), audio streams (e.g., songs, podcasts, audio books, or the like), text streams (e.g., electronic books, legal documents, manuscript drafts, or the like), sequences of images (e.g., slide shows, web sites, or the like), three-dimensional models (e.g., models of buildings in a 5G build-out area, terrain maps, models for use in extended reality media, or the like), holographic images, software updates, reference data updates, and/or other type types of media streams.
- video streams e.g., films, television shows, sports broadcasts, music videos, or the like
- audio streams e.g., songs, podcasts, audio books, or the like
- text streams e.g., electronic books, legal documents, manuscript drafts, or the like
- the AS 104 may apply one or more concealment techniques that vary some dimensional characteristic of a media stream being watermarked over time. For instance, the AS 104 may vary the location of the digital watermark within a frame of the media stream, the number of bits of the digital watermark, the pattern of bits in the digital watermark, and/or the number of bits of a noise obfuscating the digital watermark over time in the media stream (e.g., varied from one frame of the media stream to another frame of the media stream). A combination of these concealment techniques may help to ensure that the digital watermark is difficult to detect (and, therefore, remove from the media stream).
- the greater the number of concealment techniques that are employed e.g., the greater the number of dimensional characteristics of the media stream that are varied over time
- the digital watermark may be encrypted to further guard against removal of the digital watermark from the media stream.
- the AS 104 may output watermarked media streams to the DB 106 .
- the DB 106 may store media streams both before the media streams are watermarked and after the media streams are watermarked.
- the DB 106 may comprise a physical storage device integrated with the AS 104 (e.g., a database server or a file server), or attached or coupled to the AS 104 , in accordance with the present disclosure.
- the AS 104 may load instructions into a memory, or one or more distributed memory units, and execute the instructions for watermarking media streams, as described herein.
- system 100 has been simplified. Thus, those skilled in the art will realize that the system 100 may be implemented in a different form than that which is illustrated in FIG. 1 , or may be expanded by including additional endpoint devices, access networks, network elements, application servers, etc. without altering the scope of the present disclosure. In addition, system 100 may be altered to omit various elements, substitute elements for devices that perform the same or similar functions, combine elements that are illustrated as separate devices, and/or implement network elements as functions that are spread across several devices that operate collectively as the respective network elements.
- the system 100 may include other network elements (not shown) such as border elements, routers, switches, policy servers, security devices, gateways, a content distribution network (CDN) and the like.
- portions of the core network 102 , access networks 120 and 122 , and/or Internet 124 may comprise a content distribution network (CDN) having ingest servers, edge servers, and the like.
- CDN content distribution network
- access networks 120 and/or 122 may each comprise a plurality of different access networks that may interface with the core network 102 independently or in a chained manner.
- UE devices 108 , 110 , 112 , and 114 may communicate with the core network 102 via different access networks
- user endpoint devices 110 and 112 may communicate with the core network 102 via different access networks, and so forth.
- FIG. 2 illustrates a flowchart of an example method 200 for inserting a digital watermark in a stream of data, in accordance with the present disclosure.
- steps, functions and/or operations of the method 200 may be performed by a device as illustrated in FIG. 1 , e.g., AS 104 or any one or more components thereof.
- the steps, functions, or operations of method 200 may be performed by a computing device or system 400 , and/or a processing system 402 as described in connection with FIG. 4 below.
- the computing device 400 may represent at least a portion of the AS 104 in accordance with the present disclosure.
- the method 200 is described in greater detail below in connection with an example performed by a processing system, such as processing system 402 .
- the method 200 begins in step 202 and proceeds to step 204 .
- the processing system may obtain a signal comprising a plurality of frames.
- the signal may comprise a stream of data that is to be secured with a digital watermark.
- the stream of data may comprise a video stream, where each frame of the plurality frames comprises an individual video frame.
- the stream of data may comprise an audio stream, where each frame of the plurality of frames comprises an individual audio frame.
- the stream of data may comprise a stream of text, a sequence of images, a three-dimensional model, a software update, a reference data update, or another type of data.
- the stream of data may be retrieved from a database that stores a plurality of streams of data.
- the stream of data may be uploaded directly to the processing system.
- the processing system may insert a first digital watermark in a first frame of the plurality of frames.
- the first digital watermark may comprise data that is inserted into the visual data of the first frame.
- the first digital watermark may comprise a pattern of bits that is inserted into the image portion of a video frame.
- the first digital watermark may comprise data that is inserted into the audio data of the first frame.
- the first digital watermark may comprise a pattern of bits that is inserted into the audio portion of the first frame.
- the processing system may insert a second digital watermark in a second frame of the plurality of frames, where the second digital watermark differs from the first digital watermark in at least one way selected from a group of: a location within the respective frame, a number of bits, a pattern of bits, and a number of bits of a noise.
- the second digital watermark may comprise data that is inserted into the visual data of the second frame.
- the second digital watermark may comprise data that is inserted into the audio data of the second frame.
- first frame and the second frame may comprise consecutive frames (e.g., the second frame may occur immediately after the first frame when the plurality of frames is played in sequence).
- first frame and the second frame comprise nonconsecutive frames.
- the location of the first digital watermark within the first frame may differ from the location of the second digital watermark within the second frame.
- the first digital watermark may be located in the bottom left corner of the first frame, while the second digital watermark may be located in the top right corner of the second frame.
- the locations within the first frame and the second frame may be defined by pixel position (e.g., where the first frame and the second frame contain an equal number of pixels arranged in the same dimensions).
- the number of bits of the first digital watermark may differ from the number of bits of the second digital watermark.
- the first digital watermark may comprise a pattern of n bits
- the second digital watermark may comprise a pattern of at least n+1 bits.
- the pattern of the bits in the first digital watermark may differ from the pattern of the bits in the second digital watermark.
- the pattern of the bits in the first digital watermark may take on a first shape and/or color
- the pattern of bits in the second digital watermark may take on a second shape and/or color that is different from the first shape and/or color.
- the color of the person's eyes could be varied as a watermark (e.g., such that the person's eyes are brown in the first frame but green in the second frame).
- a number of bits of a noise (broadly an image noise such as random variation of brightness and/or color information in the frame) obfuscating the first digital watermark in the first frame may differ from a number of bits of a noise obfuscating the second digital watermark in the second frame. That is, a certain number of bits of noise may be introduced into a frame in a region of a digital watermark in order to help the digital watermark “blend” into the frame.
- noise can be achieved by quantizing one or more pixels of an image to a number of discrete levels as desired, but other noise generating techniques can be used such as Gaussian noise generation, random valued impulse noise generation and the like.
- the processing system may watermark the signal by varying at least one dimensional characteristic of the signal over time (e.g., over at least some frames of the plurality of frames).
- the greater the number of concealment techniques that are employed e.g., the greater the number of dimensional characteristics of the signal that are varied over time
- the dimensional characteristic(s) that is varied is user defined.
- the dimensional characteristic(s) that is varied is selected by the processing system.
- the processing system may select a dimensional characteristic or a combination of dimensional characteristics that is a good candidate for variation. Good candidates may be identified based on image processing techniques, audio processing techniques, optical character recognition techniques, and other types of techniques that may analyze specific types of data. For instance, varying a location of a digital watermark may be more effective in frames of video data than in frames of audio data. Moreover, the content of the frames may also affect which dimensional characteristics are best suited for variation for the purposes of digital watermarking.
- a digital watermark whose pattern of bits varies over several frames of video data may be harder to detect when the video data comprises a relatively fast moving or visually dense scene (e.g., a car chase, a fight scene, an explosion, etc.).
- the video data comprises a relatively slow moving or visually simple scene (e.g., a close-up on a character presenting a monologue)
- the same digital watermark may be easier to detect.
- a different or additional dimensional characteristic may be varied to make the digital watermark harder to detect, or these scenes may even be free of watermarks to avoid having the watermarks being detected in such relatively slow moving or visually simple scenes.
- a user may instead define a desired strength of the digital watermark (e.g., where the stronger the digital watermark is, the more difficult the digital watermark is to detect).
- the strength of a digital watermark may be defined according a numerical scale (e.g., one to ten, with one being the weakest and ten being the strongest) or some other rubrics (e.g., easy (e.g., using one of five available watermarking techniques), medium (e.g., using three of five available watermarking techniques), and difficult (e.g., using all five available watermarking techniques)).
- the processing system may select an optimal concealment technique or combination of concealment techniques to produce a watermark of the desired strength.
- At least one of the first digital watermark and the second digital watermark may be encrypted.
- the first digital watermark and/or the second digital watermark may be encrypted with at least one encryption scheme selected from the group of: a static encryption key and algorithm, a complex blockchain algorithm, and a one-time pad.
- a “one-time pad” may be understood to refer to a sequence of encryption keys and/or access codes which may be used sequentially or in some defined order. The same encryption keys and/or access codes cannot be used again in the same order, hence why the technique is referred to as a “one-time” pad.
- the processing system may output a watermarked signal including the first digital watermark in the first frame and the second digital watermark in the second frame.
- the watermarked signal may be output to a database for storage, to a user endpoint device for playback, or to another location.
- the method 200 may end in step 214 .
- the method 200 may be implemented in any one or more of a number of ways in practice. For instance, method 200 could be used to insert a watermark into only one frame of a signal, into every frame of a signal, or into any number of frames between one and all frames of the signal. For instance, the method 200 could be used to insert digital watermarks into a subset of frames (e.g., fewer than all frames) of a signal, where the frames in the subset may be selected randomly, periodically (e.g., every x frames), or according to some quality or complexity of the frames (e.g., the visual data in some frames may provide for better concealment of the digital watermarks than the visual data in other frames).
- the signal may include at least one frame (e.g., a third frame or more frames) that is free of watermarks.
- a single digital watermark may comprise a particular pattern of bits.
- the pattern of bits may be broken into a plurality of pieces, and the plurality of pieces may be distributed over a plurality of frames of a signal (where the plurality of frames need not necessarily be consecutive frames in the signal).
- each frame of the plurality of frames may contain a different piece of the plurality of pieces of the digital watermark.
- a digital watermark may comprise an entire frame of a signal (e.g., the first digital watermark may comprise the entirety of the first frame).
- the frame comprising the digital watermark may be inserted between two original frames of the signal (where the two original frames may be unaltered or not directly watermarked).
- a digital watermark may be content-driven (e.g., integrated into the content of the frame being watermarked).
- a digital watermark may comprise changing an eye color of a person depicted in a video signal, in one or more frames of the video signal.
- the digital watermark need not necessarily comprise a visual watermark or include a visual component. That is, for a content-driven digital watermark, any characteristic of the content of the signal may be a potential carrier for the digital watermark.
- the audio track of an audiovisual signal may carry a digital watermark, where the digital watermark may comprise one or more keywords or sound.
- the method 200 may be expanded to include additional steps or may be modified to include additional operations with respect to the steps outlined above.
- one or more steps, functions, or operations of the method 200 may include a storing, displaying, and/or outputting step as required for a particular application.
- any data, records, fields, and/or intermediate results discussed in the method can be stored, displayed, and/or outputted either on the device executing the method or to another device, as required for a particular application.
- steps, blocks, functions or operations in FIG. 2 that recite a determining operation or involve a decision do not necessarily require that both branches of the determining operation be practiced.
- one of the branches of the determining operation can be deemed as an optional step.
- steps, blocks, functions or operations of the above described method can be combined, separated, and/or performed in a different order from that described above, without departing from the examples of the present disclosure.
- FIG. 3 illustrates one example of a digital watermark that changes location from one frame to another frame within a signal.
- an example signal may include a first frame 300 and a second frame 304 , which may or may not be consecutive (e.g., the second frame 304 may or may not occur immediately after the first frame 300 ).
- each of the first frame 300 and the second frame 304 may comprise the same number of pixels.
- each of the first frame 300 and the second frame 304 is illustrated as comprising one hundred pixels arranged in ten rows and ten columns.
- the first frame 300 includes pixels 302 1 - 302 100
- the second frame includes pixels 306 1 - 306 100 .
- the first frame 300 includes a digital watermark (shown as a shaded pixel) at pixel 302 79
- the second frame 304 includes a digital watermark (again shown as a shaded pixel) at pixel 306 72 .
- the digital watermark in the first frame 300 may be identical to the digital watermark in the second frame 304 ; that is, the only difference between the digital watermarks in the first and second frames 300 and 304 may be the locations of the digital watermarks within the respective frames.
- other dimensional characteristics of the digital watermarks e.g., colors, patterns of bits, numbers of bits of noise, etc.
- the pixel position of the digital watermark may represent a numeric value.
- This approach may scale well for higher resolution videos (which include greater numbers of bits per frame).
- the numeric value may correspond to a color (e.g., a red green blue color value) of the pixel.
- FIG. 4 depicts a high-level block diagram of a computing device or processing system specifically programmed to perform the functions described herein.
- the processing system 400 comprises one or more hardware processor elements 402 (e.g., a central processing unit (CPU), a microprocessor, or a multi-core processor), a memory 404 (e.g., random access memory (RAM) and/or read only memory (ROM)), a module 405 for inserting a digital watermark in a stream of data, and various input/output devices 406 (e.g., storage devices, including but not limited to, a tape drive, a floppy drive, a hard disk drive or a compact disk drive, a receiver, a transmitter, a speaker, a display, a speech synthesizer, an output port, an input port and a user input device (such as a keyboard, a keypad, a mouse, a microphone and the like)).
- hardware processor elements 402 e.g., a central processing unit (CPU),
- the computing device may employ a plurality of processor elements.
- the computing device may employ a plurality of processor elements.
- the computing device of this figure is intended to represent each of those multiple computing devices.
- one or more hardware processors can be utilized in supporting a virtualized or shared computing environment.
- the virtualized computing environment may support one or more virtual machines representing computers, servers, or other computing devices.
- hardware components such as hardware processors and computer-readable storage devices may be virtualized or logically represented.
- the hardware processor 402 can also be configured or programmed to cause other devices to perform one or more operations as discussed above. In other words, the hardware processor 402 may serve the function of a central controller directing other devices to perform the one or more operations as discussed above.
- the present disclosure can be implemented in software and/or in a combination of software and hardware, e.g., using application specific integrated circuits (ASIC), a programmable gate array (PGA) including a Field PGA, or a state machine deployed on a hardware device, a computing device or any other hardware equivalents, e.g., computer readable instructions pertaining to the method discussed above can be used to configure a hardware processor to perform the steps, functions and/or operations of the above disclosed method 200 .
- ASIC application specific integrated circuits
- PGA programmable gate array
- Field PGA programmable gate array
- a state machine deployed on a hardware device e.g., a hardware device or any other hardware equivalents, e.g., computer readable instructions pertaining to the method discussed above can be used to configure a hardware processor to perform the steps, functions and/or operations of the above disclosed method 200 .
- instructions and data for the present module or process 405 for inserting a digital watermark in a stream of data can be loaded into memory 404 and executed by hardware processor element 402 to implement the steps, functions, or operations as discussed above in connection with the illustrative method 200 .
- a hardware processor executes instructions to perform “operations,” this could include the hardware processor performing the operations directly and/or facilitating, directing, or cooperating with another hardware device or component (e.g., a co-processor and the like) to perform the operations.
- the processor executing the computer readable or software instructions relating to the above described method can be perceived as a programmed processor or a specialized processor.
- the present module 405 for inserting a digital watermark in a stream of data (including associated data structures) of the present disclosure can be stored on a tangible or physical (broadly non-transitory) computer-readable storage device or medium, e.g., volatile memory, non-volatile memory, ROM memory, RAM memory, magnetic or optical drive, device or diskette, and the like.
- a “tangible” computer-readable storage device or medium comprises a physical device, a hardware device, or a device that is discernible by the touch. More specifically, the computer-readable storage device may comprise any physical devices that provide the ability to store information such as data and/or instructions to be accessed by a processor or a computing device such as a computer or an application server.
Abstract
In one example, a method for inserting a digital watermark in a signal includes obtaining the signal comprising a plurality of frames, inserting a first digital watermark in a first frame of the plurality of frames, inserting a second digital watermark in a second frame of the plurality of frames, wherein the second digital watermark differs from the first digital watermark in at least one way selected from a group of: a location within a respective frame, a number of bits, a pattern of bits, and a number of bits of a noise, and outputting a watermarked signal including the first digital watermark in the first frame and the second digital watermark in the second frame.
Description
- This application is a continuation of U.S. patent application Ser. No. 16/880,912, filed May 21, 2020, now U.S. Pat. No. 11,443,401, which is herein incorporated by reference in its entirety.
- The present disclosure relates generally to data security, and relates more particularly to devices, non-transitory computer-readable media, and methods for digital watermarking.
- Digital watermarks comprise specific types of markers that may be embedded in noise tolerant signals such as image, video, audio, or other signals (generally “media signals”). The markers typically hide information in carrier signals that carry the media signals. Thus, digital watermarks are commonly used to protect streaming media against unauthorized use and/or to verify the authenticity of the streaming media to users. As an example, multiple “screener” copies of a film that has been nominated for an award may be distributed to voters who will vote on the award, and each screener copy may bear a different, unique digital watermark. Thus, if an unauthorized party comes into possession of a screener copy, the screener copy can be traced back to the original party to whom the screener copy was provided based on the unique digital watermark, allowing the owners of the film to easily identify any points of compromise in the chain of distribution.
- The teachings of the present disclosure can be readily understood by considering the following detailed description in conjunction with the accompanying drawings, in which:
-
FIG. 1 illustrates an example system in which examples of the present disclosure for digital watermarking may operate; -
FIG. 2 illustrates a flowchart of an example method for inserting a digital watermark in a stream of data, in accordance with the present disclosure; -
FIG. 3 illustrates one example of a digital watermark that changes location from one frame to another frame within a signal; and -
FIG. 4 illustrates an example of a computing device, or computing system, specifically programmed to perform the steps, functions, blocks, and/or operations described herein. - To facilitate understanding, similar reference numerals have been used, where possible, to designate elements that are common to the figures.
- The present disclosure broadly discloses methods, computer-readable media, and systems for inserting a digital watermark in a stream of data. In one example, a method for inserting a digital watermark in a signal includes obtaining the signal comprising a plurality of frames, inserting a first digital watermark in a first frame of the plurality of frames, inserting a second digital watermark in a second frame of the plurality of frames, wherein the second digital watermark differs from the first digital watermark in at least one way selected from a group of: a location within a respective frame, a number of bits, a pattern of bits, and a number of bits of a noise, and outputting a watermarked signal including the first digital watermark in the first frame and the second digital watermark in the second frame.
- In another example, a non-transitory computer-readable medium may store instructions which, when executed by a processing system in a communications network, cause the processing system to perform operations. The operations may include obtaining the signal comprising a plurality of frames, inserting a first digital watermark in a first frame of the plurality of frames, inserting a second digital watermark in a second frame of the plurality of frames, wherein the second digital watermark differs from the first digital watermark in at least one way selected from a group of: a location within a respective frame, a number of bits, a pattern of bits, and a number of bits of a noise, and outputting a watermarked signal including the first digital watermark in the first frame and the second digital watermark in the second frame.
- In another example, a device may include a processing system including at least one processor and a non-transitory computer-readable medium storing instructions which, when executed by the processing system when deployed in a communications network, cause the processing system to perform operations. The operations may include obtaining the signal comprising a plurality of frames, inserting a first digital watermark in a first frame of the plurality of frames, inserting a second digital watermark in a second frame of the plurality of frames, wherein the second digital watermark differs from the first digital watermark in at least one way selected from a group of: a location within a respective frame, a number of bits, a pattern of bits, and a number of bits of a noise, and outputting a watermarked signal including the first digital watermark in the first frame and the second digital watermark in the second frame.
- As discussed above, digital watermarks comprise specific types of markers that may be embedded in noise tolerant signals such as image, video, audio, or other signals (generally “media signals”). The markers typically hide information in carrier signals that carry the media signals. Thus, digital watermarks are commonly used to protect streaming media against unauthorized use and/or to verify the authenticity of the streaming media to users. Unfortunately, conventional digital watermarks tend to be obvious and intrusive, especially in video media. The presence of a digital watermark may therefore be distracting from a user perspective (e.g., a viewer of watermarked film) and may undesirably compromise the artistic integrity of the watermarked media from a creator perspective (e.g., a director of a watermarked film).
- Moreover, even when the digital watermark is relatively unobtrusive, the digital watermark may still fail to protect the watermarked media and/or the users of the watermarked media. For instance, many digital watermarks can be easily replicated or even washed out of a media stream when the media stream is transmitted and presented without proper authorization. In addition, a party receiving a watermarked media may be unable to leverage the watermark as proof that the watermarked media has not been tampered with, due to a functional gap in software and/or in a reference data transfer. The inability to verify that the watermarked media has not been tampered with may leave the receiving party vulnerable to software and other attacks.
- Examples of the present disclosure provide a plurality of watermark concealment techniques that can be used in various permutations to conceal a digital watermark in a media. In one example, each of the watermark concealment techniques involves varying some dimensional characteristic of a signal containing the media over time. For instance, the location of the digital watermark within a frame of the signal, the number of bits of the digital watermark, the pattern of bits in the digital watermark, and/or the number of bits of a noise obfuscating the digital watermark may be varied over time in the signal (e.g., varied from one frame of the signal to another frame of the signal). Employing a combination of these concealment techniques may help to ensure that the digital watermark is difficult to detect (and, therefore, remove from the signal). For instance, the greater the number of concealment techniques that are employed (e.g., the greater the number of dimensional characteristics of the signal that are varied over time), the harder it will be to detect every instance of the digital watermark in the signal. In further examples, the digital watermark may be encrypted to further guard against removal of the digital watermark from the signal.
- A digital watermark of the present disclosure may be used in any of the manners that a conventional digital watermark may be used, including copyright protection, source tracking, broadcast monitoring, video and/or audio authentication, fraud detection, identification card security, social network content management, and other applications. These and other aspects of the present disclosure are discussed in greater detail below in connection with the examples of
FIGS. 1-4 . - To further aid in understanding the present disclosure,
FIG. 1 illustrates anexample system 100 in which examples of the present disclosure for digital watermarking may operate. Thesystem 100 may include any one or more types of communication networks, such as a traditional circuit switched network (e.g., a public switched telephone network (PSTN)) or a packet network such as an Internet Protocol (IP) network (e.g., an IP Multimedia Subsystem (IMS) network), an asynchronous transfer mode (ATM) network, a wired network, a wireless network, and/or a cellular network (e.g., 2G-5G, a long term evolution (LTE) network, and the like) related to the current disclosure. It should be noted that an IP network is broadly defined as a network that uses Internet Protocol to exchange data packets. Additional example IP networks include Voice over IP (VoIP) networks, Service over IP (SoIP) networks, the World Wide Web, and the like. - In one example, the
system 100 may comprise acore network 102. Thecore network 102 may be in communication with one ormore access networks core network 102 may functionally comprise a fixed mobile convergence (FMC) network, e.g., an IP Multimedia Subsystem (IMS) network. In addition, thecore network 102 may functionally comprise a telephony network, e.g., an Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) backbone network utilizing Session Initiation Protocol (SIP) for circuit-switched and Voice over Internet Protocol (VoIP) telephony services. In one example, thecore network 102 may include at least one application server (AS) 104, at least one database (DB) 106, and a plurality of edge routers 128-130. For ease of illustration, various additional elements of thecore network 102 are omitted fromFIG. 1 . - In one example, the
access networks core network 102 may provide a cable television service, an IPTV service, or any other types of telecommunication services to subscribers viaaccess networks access networks core network 102 may be operated by a telecommunication network service provider (e.g., an Internet service provider, or a service provider who provides Internet services in addition to other telecommunication services). Thecore network 102 and theaccess networks access networks 120 and/or 122 may be operated by entities having core businesses that are not related to telecommunications services, e.g., corporate, governmental, or educational institution LANs, and the like. - In one example, the
access network 120 may be in communication with one or moreuser endpoint devices access network 122 may be in communication with one or moreuser endpoint devices access networks user endpoint devices user endpoint devices core network 102, devices reachable via the Internet in general, and so forth. In one example, each of theuser endpoint devices user endpoint devices - In one example, one or
more servers 126 may be accessible touser endpoint devices servers 126 may comprise content servers, e.g., servers that store content such as images, text, video, and the like which may be served to web browser applications executing on theuser endpoint devices - In accordance with the present disclosure, the AS 104 may be configured to provide one or more operations or functions in connection with examples of the present disclosure for digital watermarking, as described herein. The
AS 104 may comprise one or more physical devices, e.g., one or more computing systems or servers, such ascomputing system 400 depicted inFIG. 4 , and may be configured as described below to insert digital watermarks into media streams. It should be noted that as used herein, the terms “configure,” and “reconfigure” may refer to programming or loading a processing system with computer-readable/computer-executable instructions, code, and/or programs, e.g., in a distributed or non-distributed memory, which when executed by a processor, or processors, of the processing system within a same device or within distributed devices, may cause the processing system to perform various functions. Such terms may also encompass providing variables, data values, tables, objects, or other data structures or the like which may cause a processing system executing computer-readable instructions, code, and/or programs to function differently depending upon the values of the variables or other data structures that are provided. As referred to herein a “processing system” may comprise a computing device including one or more processors, or cores (e.g., as illustrated inFIG. 4 and discussed below) or multiple computing devices collectively configured to perform various steps, functions, and/or operations in accordance with the present disclosure. - In one example, the
AS 104 may be configured to retrieve media streams from a storage device, such as the database (DB) 106. For instance, in one example, the media streams may include video streams (e.g., films, television shows, sports broadcasts, music videos, or the like), audio streams (e.g., songs, podcasts, audio books, or the like), text streams (e.g., electronic books, legal documents, manuscript drafts, or the like), sequences of images (e.g., slide shows, web sites, or the like), three-dimensional models (e.g., models of buildings in a 5G build-out area, terrain maps, models for use in extended reality media, or the like), holographic images, software updates, reference data updates, and/or other type types of media streams. - In one example, the
AS 104 may apply one or more concealment techniques that vary some dimensional characteristic of a media stream being watermarked over time. For instance, theAS 104 may vary the location of the digital watermark within a frame of the media stream, the number of bits of the digital watermark, the pattern of bits in the digital watermark, and/or the number of bits of a noise obfuscating the digital watermark over time in the media stream (e.g., varied from one frame of the media stream to another frame of the media stream). A combination of these concealment techniques may help to ensure that the digital watermark is difficult to detect (and, therefore, remove from the media stream). For instance, the greater the number of concealment techniques that are employed (e.g., the greater the number of dimensional characteristics of the media stream that are varied over time), the harder it will be to detect every instance of the digital watermark in the signal. In further examples, the digital watermark may be encrypted to further guard against removal of the digital watermark from the media stream. One specific example of a method for inserting digital watermarks into media streams is described in greater detail in connection withFIG. 2 . - In one example, the
AS 104 may output watermarked media streams to theDB 106. Thus, theDB 106 may store media streams both before the media streams are watermarked and after the media streams are watermarked. In one example, theDB 106 may comprise a physical storage device integrated with the AS 104 (e.g., a database server or a file server), or attached or coupled to theAS 104, in accordance with the present disclosure. In one example, theAS 104 may load instructions into a memory, or one or more distributed memory units, and execute the instructions for watermarking media streams, as described herein. - It should be noted that the
system 100 has been simplified. Thus, those skilled in the art will realize that thesystem 100 may be implemented in a different form than that which is illustrated inFIG. 1 , or may be expanded by including additional endpoint devices, access networks, network elements, application servers, etc. without altering the scope of the present disclosure. In addition,system 100 may be altered to omit various elements, substitute elements for devices that perform the same or similar functions, combine elements that are illustrated as separate devices, and/or implement network elements as functions that are spread across several devices that operate collectively as the respective network elements. - For example, the
system 100 may include other network elements (not shown) such as border elements, routers, switches, policy servers, security devices, gateways, a content distribution network (CDN) and the like. For example, portions of thecore network 102,access networks Internet 124 may comprise a content distribution network (CDN) having ingest servers, edge servers, and the like. Similarly, although only two access networks, 120 and 122 are shown, in other examples,access networks 120 and/or 122 may each comprise a plurality of different access networks that may interface with thecore network 102 independently or in a chained manner. For example,UE devices core network 102 via different access networks,user endpoint devices core network 102 via different access networks, and so forth. Thus, these and other modifications are all contemplated within the scope of the present disclosure. -
FIG. 2 illustrates a flowchart of anexample method 200 for inserting a digital watermark in a stream of data, in accordance with the present disclosure. In one example, steps, functions and/or operations of themethod 200 may be performed by a device as illustrated inFIG. 1 , e.g., AS 104 or any one or more components thereof. In one example, the steps, functions, or operations ofmethod 200 may be performed by a computing device orsystem 400, and/or aprocessing system 402 as described in connection withFIG. 4 below. For instance, thecomputing device 400 may represent at least a portion of theAS 104 in accordance with the present disclosure. For illustrative purposes, themethod 200 is described in greater detail below in connection with an example performed by a processing system, such asprocessing system 402. - The
method 200 begins instep 202 and proceeds to step 204. Instep 204, the processing system may obtain a signal comprising a plurality of frames. The signal may comprise a stream of data that is to be secured with a digital watermark. For instance, in one example, the stream of data may comprise a video stream, where each frame of the plurality frames comprises an individual video frame. In another example, the stream of data may comprise an audio stream, where each frame of the plurality of frames comprises an individual audio frame. In further examples, the stream of data may comprise a stream of text, a sequence of images, a three-dimensional model, a software update, a reference data update, or another type of data. In one example, the stream of data may be retrieved from a database that stores a plurality of streams of data. In another example, the stream of data may be uploaded directly to the processing system. - In
step 206, the processing system may insert a first digital watermark in a first frame of the plurality of frames. In one example, the first digital watermark may comprise data that is inserted into the visual data of the first frame. For instance, the first digital watermark may comprise a pattern of bits that is inserted into the image portion of a video frame. In another example, the first digital watermark may comprise data that is inserted into the audio data of the first frame. For instance, the first digital watermark may comprise a pattern of bits that is inserted into the audio portion of the first frame. - In
step 208, the processing system may insert a second digital watermark in a second frame of the plurality of frames, where the second digital watermark differs from the first digital watermark in at least one way selected from a group of: a location within the respective frame, a number of bits, a pattern of bits, and a number of bits of a noise. In one example, the second digital watermark may comprise data that is inserted into the visual data of the second frame. In another example, the second digital watermark may comprise data that is inserted into the audio data of the second frame. - In one example, the first frame and the second frame may comprise consecutive frames (e.g., the second frame may occur immediately after the first frame when the plurality of frames is played in sequence). However, in another example, the first frame and the second frame comprise nonconsecutive frames.
- For instance, in one example, the location of the first digital watermark within the first frame may differ from the location of the second digital watermark within the second frame. As an example, the first digital watermark may be located in the bottom left corner of the first frame, while the second digital watermark may be located in the top right corner of the second frame. In one example, the locations within the first frame and the second frame may be defined by pixel position (e.g., where the first frame and the second frame contain an equal number of pixels arranged in the same dimensions).
- In one example, the number of bits of the first digital watermark may differ from the number of bits of the second digital watermark. For instance, the first digital watermark may comprise a pattern of n bits, while the second digital watermark may comprise a pattern of at least n+1 bits.
- In one example, the pattern of the bits in the first digital watermark may differ from the pattern of the bits in the second digital watermark. For instance, the pattern of the bits in the first digital watermark may take on a first shape and/or color, while the pattern of bits in the second digital watermark may take on a second shape and/or color that is different from the first shape and/or color. As an example, if the stream of data is a video, and the first and second frames comprise first and second video frames depicting a person, the color of the person's eyes could be varied as a watermark (e.g., such that the person's eyes are brown in the first frame but green in the second frame).
- In one example, a number of bits of a noise (broadly an image noise such as random variation of brightness and/or color information in the frame) obfuscating the first digital watermark in the first frame may differ from a number of bits of a noise obfuscating the second digital watermark in the second frame. That is, a certain number of bits of noise may be introduced into a frame in a region of a digital watermark in order to help the digital watermark “blend” into the frame. For example, such noise can be achieved by quantizing one or more pixels of an image to a number of discrete levels as desired, but other noise generating techniques can be used such as Gaussian noise generation, random valued impulse noise generation and the like.
- Thus, the processing system may watermark the signal by varying at least one dimensional characteristic of the signal over time (e.g., over at least some frames of the plurality of frames). In one example, the greater the number of concealment techniques that are employed (e.g., the greater the number of dimensional characteristics of the signal that are varied over time), the harder it will be to detect every instance of the digital watermark in the signal. For instance, even if the first digital watermark is detected in the first frame, the variation of the dimensional characteristic(s) may ensure that the second digital watermark cannot be detected in the second frame based on the knowledge of the first digital watermark alone.
- In one example, the dimensional characteristic(s) that is varied is user defined. However, in another example, the dimensional characteristic(s) that is varied is selected by the processing system. For instance, the processing system may select a dimensional characteristic or a combination of dimensional characteristics that is a good candidate for variation. Good candidates may be identified based on image processing techniques, audio processing techniques, optical character recognition techniques, and other types of techniques that may analyze specific types of data. For instance, varying a location of a digital watermark may be more effective in frames of video data than in frames of audio data. Moreover, the content of the frames may also affect which dimensional characteristics are best suited for variation for the purposes of digital watermarking. For instance, a digital watermark whose pattern of bits varies over several frames of video data may be harder to detect when the video data comprises a relatively fast moving or visually dense scene (e.g., a car chase, a fight scene, an explosion, etc.). However, when the video data comprises a relatively slow moving or visually simple scene (e.g., a close-up on a character presenting a monologue), the same digital watermark may be easier to detect. Thus, in the example of the relatively slow moving or visually simple scene, a different or additional dimensional characteristic may be varied to make the digital watermark harder to detect, or these scenes may even be free of watermarks to avoid having the watermarks being detected in such relatively slow moving or visually simple scenes.
- In another example, rather than define the specific dimensional characteristics to be varied, a user may instead define a desired strength of the digital watermark (e.g., where the stronger the digital watermark is, the more difficult the digital watermark is to detect). For instance, the strength of a digital watermark may be defined according a numerical scale (e.g., one to ten, with one being the weakest and ten being the strongest) or some other rubrics (e.g., easy (e.g., using one of five available watermarking techniques), medium (e.g., using three of five available watermarking techniques), and difficult (e.g., using all five available watermarking techniques)). Based on the user selection, the processing system may select an optimal concealment technique or combination of concealment techniques to produce a watermark of the desired strength.
- In optional step 210 (illustrated in phantom), at least one of the first digital watermark and the second digital watermark may be encrypted. For instance, the first digital watermark and/or the second digital watermark may be encrypted with at least one encryption scheme selected from the group of: a static encryption key and algorithm, a complex blockchain algorithm, and a one-time pad. Within the context of the present disclosure, a “one-time pad” may be understood to refer to a sequence of encryption keys and/or access codes which may be used sequentially or in some defined order. The same encryption keys and/or access codes cannot be used again in the same order, hence why the technique is referred to as a “one-time” pad.
- In
step 212, the processing system may output a watermarked signal including the first digital watermark in the first frame and the second digital watermark in the second frame. For instance, the watermarked signal may be output to a database for storage, to a user endpoint device for playback, or to another location. - The
method 200 may end instep 214. - The
method 200 may be implemented in any one or more of a number of ways in practice. For instance,method 200 could be used to insert a watermark into only one frame of a signal, into every frame of a signal, or into any number of frames between one and all frames of the signal. For instance, themethod 200 could be used to insert digital watermarks into a subset of frames (e.g., fewer than all frames) of a signal, where the frames in the subset may be selected randomly, periodically (e.g., every x frames), or according to some quality or complexity of the frames (e.g., the visual data in some frames may provide for better concealment of the digital watermarks than the visual data in other frames). Thus, the signal may include at least one frame (e.g., a third frame or more frames) that is free of watermarks. - For instance, a single digital watermark may comprise a particular pattern of bits. The pattern of bits may be broken into a plurality of pieces, and the plurality of pieces may be distributed over a plurality of frames of a signal (where the plurality of frames need not necessarily be consecutive frames in the signal). Thus, each frame of the plurality of frames may contain a different piece of the plurality of pieces of the digital watermark.
- In another example, a digital watermark may comprise an entire frame of a signal (e.g., the first digital watermark may comprise the entirety of the first frame). For instance, the frame comprising the digital watermark may be inserted between two original frames of the signal (where the two original frames may be unaltered or not directly watermarked).
- In further examples, a digital watermark may be content-driven (e.g., integrated into the content of the frame being watermarked). For instance, as discussed above, a digital watermark may comprise changing an eye color of a person depicted in a video signal, in one or more frames of the video signal.
- Furthermore, the digital watermark need not necessarily comprise a visual watermark or include a visual component. That is, for a content-driven digital watermark, any characteristic of the content of the signal may be a potential carrier for the digital watermark. For instance, the audio track of an audiovisual signal may carry a digital watermark, where the digital watermark may comprise one or more keywords or sound.
- It should be noted that the
method 200 may be expanded to include additional steps or may be modified to include additional operations with respect to the steps outlined above. In addition, although not specifically specified, one or more steps, functions, or operations of themethod 200 may include a storing, displaying, and/or outputting step as required for a particular application. In other words, any data, records, fields, and/or intermediate results discussed in the method can be stored, displayed, and/or outputted either on the device executing the method or to another device, as required for a particular application. Furthermore, steps, blocks, functions or operations inFIG. 2 that recite a determining operation or involve a decision do not necessarily require that both branches of the determining operation be practiced. In other words, one of the branches of the determining operation can be deemed as an optional step. Furthermore, steps, blocks, functions or operations of the above described method can be combined, separated, and/or performed in a different order from that described above, without departing from the examples of the present disclosure. -
FIG. 3 illustrates one example of a digital watermark that changes location from one frame to another frame within a signal. For instance, an example signal may include afirst frame 300 and asecond frame 304, which may or may not be consecutive (e.g., thesecond frame 304 may or may not occur immediately after the first frame 300). In one example, each of thefirst frame 300 and thesecond frame 304 may comprise the same number of pixels. For the sake of example, each of thefirst frame 300 and thesecond frame 304 is illustrated as comprising one hundred pixels arranged in ten rows and ten columns. For instance, thefirst frame 300 includes pixels 302 1-302 100, while the second frame includes pixels 306 1-306 100. - In one example, the
first frame 300 includes a digital watermark (shown as a shaded pixel) at pixel 302 79, while thesecond frame 304 includes a digital watermark (again shown as a shaded pixel) at pixel 306 72. The digital watermark in thefirst frame 300 may be identical to the digital watermark in thesecond frame 304; that is, the only difference between the digital watermarks in the first andsecond frames - Thus, according to the example of
FIG. 3 , the pixel position of the digital watermark may represent a numeric value. This approach may scale well for higher resolution videos (which include greater numbers of bits per frame). In another example, the numeric value may correspond to a color (e.g., a red green blue color value) of the pixel. -
FIG. 4 depicts a high-level block diagram of a computing device or processing system specifically programmed to perform the functions described herein. As depicted inFIG. 4 , theprocessing system 400 comprises one or more hardware processor elements 402 (e.g., a central processing unit (CPU), a microprocessor, or a multi-core processor), a memory 404 (e.g., random access memory (RAM) and/or read only memory (ROM)), amodule 405 for inserting a digital watermark in a stream of data, and various input/output devices 406 (e.g., storage devices, including but not limited to, a tape drive, a floppy drive, a hard disk drive or a compact disk drive, a receiver, a transmitter, a speaker, a display, a speech synthesizer, an output port, an input port and a user input device (such as a keyboard, a keypad, a mouse, a microphone and the like)). Although only one processor element is shown, it should be noted that the computing device may employ a plurality of processor elements. Furthermore, although only one computing device is shown in the figure, if themethod 200 as discussed above is implemented in a distributed or parallel manner for a particular illustrative example, i.e., the steps of theabove method 200 or theentire method 200 is implemented across multiple or parallel computing devices, e.g., a processing system, then the computing device of this figure is intended to represent each of those multiple computing devices. - Furthermore, one or more hardware processors can be utilized in supporting a virtualized or shared computing environment. The virtualized computing environment may support one or more virtual machines representing computers, servers, or other computing devices. In such virtualized virtual machines, hardware components such as hardware processors and computer-readable storage devices may be virtualized or logically represented. The
hardware processor 402 can also be configured or programmed to cause other devices to perform one or more operations as discussed above. In other words, thehardware processor 402 may serve the function of a central controller directing other devices to perform the one or more operations as discussed above. - It should be noted that the present disclosure can be implemented in software and/or in a combination of software and hardware, e.g., using application specific integrated circuits (ASIC), a programmable gate array (PGA) including a Field PGA, or a state machine deployed on a hardware device, a computing device or any other hardware equivalents, e.g., computer readable instructions pertaining to the method discussed above can be used to configure a hardware processor to perform the steps, functions and/or operations of the above disclosed
method 200. In one example, instructions and data for the present module orprocess 405 for inserting a digital watermark in a stream of data (e.g., a software program comprising computer-executable instructions) can be loaded intomemory 404 and executed byhardware processor element 402 to implement the steps, functions, or operations as discussed above in connection with theillustrative method 200. Furthermore, when a hardware processor executes instructions to perform “operations,” this could include the hardware processor performing the operations directly and/or facilitating, directing, or cooperating with another hardware device or component (e.g., a co-processor and the like) to perform the operations. - The processor executing the computer readable or software instructions relating to the above described method can be perceived as a programmed processor or a specialized processor. As such, the
present module 405 for inserting a digital watermark in a stream of data (including associated data structures) of the present disclosure can be stored on a tangible or physical (broadly non-transitory) computer-readable storage device or medium, e.g., volatile memory, non-volatile memory, ROM memory, RAM memory, magnetic or optical drive, device or diskette, and the like. Furthermore, a “tangible” computer-readable storage device or medium comprises a physical device, a hardware device, or a device that is discernible by the touch. More specifically, the computer-readable storage device may comprise any physical devices that provide the ability to store information such as data and/or instructions to be accessed by a processor or a computing device such as a computer or an application server. - While various examples have been described above, it should be understood that they have been presented by way of illustration only, and not a limitation. Thus, the breadth and scope of any aspect of the present disclosure should not be limited by any of the above-described examples, but should be defined only in accordance with the following claims and their equivalents.
Claims (20)
1. A method comprising:
obtaining, by a processing system including at least one processor, a signal containing a media;
inserting, by the processing system, a first digital watermark in a first frame of the media;
inserting, by the processing system, a second digital watermark in a second frame of the media, wherein the second digital watermark differs from the first digital watermark in at least one way comprising at least one of: a number of bits, a pattern of bits, or a number of bits of a noise; and
outputting, by the processing system, a watermarked signal containing the media including the first digital watermark in the first frame and the second digital watermark in the second frame.
2. The method of claim 1 , wherein the media comprises a video media comprising a plurality of video frames including the first frame and the second frame.
3. The method of claim 1 , wherein the media comprises an audio media comprising a plurality of audio frames including the first frame and the second frame.
4. The method of claim 1 , wherein the media comprises an image media comprising a plurality of image frames including the first frame and the second frame.
5. The method of claim 1 , wherein the first frame and the second frame comprise consecutive frames of a plurality of frames of the media.
6. The method of claim 1 , wherein the first frame and the second frame comprise nonconsecutive frames of a plurality of frames of the media.
7. The method of claim 1 , wherein the pattern of bits in the first digital watermark takes on a first shape, and the pattern of bits in the second digital watermark takes on a second shape that is different from the first shape.
8. The method of claim 1 , wherein the pattern of bits in the first digital watermark takes on a first color, and the pattern of bits in the second digital watermark takes on a second color that is different from the first color.
9. The method of claim 1 , further comprising, prior to the outputting:
encrypting, by the processing system, at least one of: the first digital watermark or the second digital watermark.
10. The method of claim 9 , wherein the encrypting utilizes at least one of: a static encryption key and algorithm, a complex blockchain algorithm, or a one-time pad.
11. The method of claim 1 , wherein a third frame of the media is free of watermarks.
12. The method of claim 1 , wherein the pattern of bits is broken into a plurality of pieces, wherein a first piece of the plurality of pieces is inserted into the first frame as the first digital watermark and a second piece of the plurality of pieces is inserted into the second frame as the second digital watermark.
13. The method of claim 1 , wherein the first digital watermark comprised an entirety of the first frame.
14. The method of claim 1 , wherein the first digital watermark is inserted into visual data of the first frame and the second digital watermark is inserted into visual data of the second frame.
15. The method of claim 1 , wherein the first digital watermark is inserted into audio data of the first frame and the second digital watermark is inserted into audio data of the second frame.
16. The method of claim 1 , wherein the first frame and the second frame are randomly selected from among a plurality of frames of the media for insertion of the first digital watermark and the second digital watermark, respectively.
17. The method of claim 1 , wherein the first digital watermark and the second digital watermark each comprise one piece of a larger digital watermark that has been broken into a plurality of pieces, wherein the plurality of pieces is distributed over a plurality of frames of the media including the first frame and the second frame.
18. A non-transitory computer-readable medium storing instructions which, when executed by a processing system including at least one processor, cause the processing system to perform operations, the operations comprising:
obtaining a signal containing a media;
inserting a first digital watermark in a first frame of the media;
inserting a second digital watermark in a second frame of the media, wherein the second digital watermark differs from the first digital watermark in at least one way comprising at least one of: a number of bits, a pattern of bits, or a number of bits of a noise; and
outputting a watermarked signal containing the media including the first digital watermark in the first frame and the second digital watermark in the second frame.
19. The non-transitory computer-readable medium of claim 18 , wherein the first frame and the second frame are randomly selected from among a plurality of frames of the media for insertion of the first digital watermark and the second digital watermark, respectively.
20. A device comprising:
a processing system including at least one processor; and
a non-transitory computer-readable medium storing instructions which, when executed by the processing system, cause the processing system to perform operations, the operations comprising:
obtaining a signal containing a media;
inserting a first digital watermark in a first frame of the media;
inserting a second digital watermark in a second frame of the media, wherein the second digital watermark differs from the first digital watermark in at least one way comprising at least one of: a number of bits, a pattern of bits, or a number of bits of a noise; and
outputting a watermarked signal containing the media including the first digital watermark in the first frame and the second digital watermark in the second frame.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/931,534 US20230005094A1 (en) | 2020-05-21 | 2022-09-12 | Digital watermarking |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/880,912 US11443401B2 (en) | 2020-05-21 | 2020-05-21 | Digital watermarking |
US17/931,534 US20230005094A1 (en) | 2020-05-21 | 2022-09-12 | Digital watermarking |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/880,912 Continuation US11443401B2 (en) | 2020-05-21 | 2020-05-21 | Digital watermarking |
Publications (1)
Publication Number | Publication Date |
---|---|
US20230005094A1 true US20230005094A1 (en) | 2023-01-05 |
Family
ID=78608238
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/880,912 Active 2040-08-15 US11443401B2 (en) | 2020-05-21 | 2020-05-21 | Digital watermarking |
US17/931,534 Abandoned US20230005094A1 (en) | 2020-05-21 | 2022-09-12 | Digital watermarking |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/880,912 Active 2040-08-15 US11443401B2 (en) | 2020-05-21 | 2020-05-21 | Digital watermarking |
Country Status (1)
Country | Link |
---|---|
US (2) | US11443401B2 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11445230B2 (en) | 2020-11-24 | 2022-09-13 | At&T Intellectual Property I, L.P. | Analysis of copy protected content and user streams |
TWI790718B (en) * | 2021-08-19 | 2023-01-21 | 宏碁股份有限公司 | Conference terminal and echo cancellation method for conference |
Citations (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5832119A (en) * | 1993-11-18 | 1998-11-03 | Digimarc Corporation | Methods for controlling systems using control signals embedded in empirical data |
US5960081A (en) * | 1997-06-05 | 1999-09-28 | Cray Research, Inc. | Embedding a digital signature in a video sequence |
US20020027612A1 (en) * | 2000-09-07 | 2002-03-07 | Brill Michael H. | Spatio-temporal channel for images |
US6411725B1 (en) * | 1995-07-27 | 2002-06-25 | Digimarc Corporation | Watermark enabled video objects |
US6449379B1 (en) * | 1993-11-18 | 2002-09-10 | Digimarc Corporation | Video steganography methods avoiding introduction of fixed pattern noise |
US20020186863A1 (en) * | 1994-10-21 | 2002-12-12 | Rhoads Geoffrey B. | Redundantly embedding auxiliary data in source signals |
US20040125125A1 (en) * | 2002-06-29 | 2004-07-01 | Levy Kenneth L. | Embedded data windows in audio sequences and video frames |
US6823455B1 (en) * | 1999-04-08 | 2004-11-23 | Intel Corporation | Method for robust watermarking of content |
US20050123169A1 (en) * | 2001-03-08 | 2005-06-09 | Wendt Peter D. | Method to make wavelet watermarks resistant to affine transformations |
US20050159831A1 (en) * | 2004-01-21 | 2005-07-21 | Kaliappan Gopalan | Steganographic method for covert audio communications |
US20060140441A1 (en) * | 1999-09-01 | 2006-06-29 | Marc Miller | Watermarking different areas of digital images with different intensities |
US20070003102A1 (en) * | 2003-04-17 | 2007-01-04 | Nippon Telegraph And Telephone Corporation | Electronic watermark-containing moving picture transmission system, electronic watermark-containing moving picture transmission method, information processing device, communication control device, electronic watermark-containing moving picture processing program, and storage medium containing electronic watermark-containing |
US7188186B1 (en) * | 1999-09-03 | 2007-03-06 | Meyer Thomas W | Process of and system for seamlessly embedding executable program code into media file formats such as MP3 and the like for execution by digital media player and viewing systems |
US20070136597A1 (en) * | 1998-09-25 | 2007-06-14 | Levy Kenneth L | Methods and Apparatus for Robust Embedded Data |
US20070223778A1 (en) * | 2001-06-28 | 2007-09-27 | Paola Hobson | Method And Apparatus For Video/Image Communication With Watermarking |
US20080056529A1 (en) * | 2006-09-06 | 2008-03-06 | Bhattacharjya Anoop K | Systems and Methods for Image Watermarking |
US20090228592A1 (en) * | 2005-08-23 | 2009-09-10 | Macrovision Corporation | Techniques for watermarking and distributing content |
US20100228632A1 (en) * | 2009-03-03 | 2010-09-09 | Rodriguez Tony F | Narrowcasting From Public Displays, and Related Methods |
US20110007935A1 (en) * | 2000-04-19 | 2011-01-13 | Reed Alastair M | Digital Watermarking in Data Representing Color Channels |
US20110019870A1 (en) * | 2007-12-17 | 2011-01-27 | Csp - Innovazione Nelle Ict Scarl | Embedding interactive data into an audiovisual content by watermarking |
US20110055860A1 (en) * | 2004-04-07 | 2011-03-03 | Arun Ramaswamy | Data insertion apparatus and methods for use with compressed audio/video data |
US20110129116A1 (en) * | 2008-07-03 | 2011-06-02 | Thorwirth Niels J | Efficient watermarking approaches of compressed media |
US8054969B2 (en) * | 2007-02-15 | 2011-11-08 | Avaya Inc. | Transmission of a digital message interspersed throughout a compressed information signal |
US20140047475A1 (en) * | 2012-07-16 | 2014-02-13 | Lg Electronics Inc. | Method and apparatus for processing digital service signals |
US20140270337A1 (en) * | 2013-03-14 | 2014-09-18 | Verance Corporation | Transactional video marking system |
US20140270331A1 (en) * | 2013-03-15 | 2014-09-18 | Rimage Corporation | Content watermarking |
US20140325205A1 (en) * | 2012-07-12 | 2014-10-30 | Xsette Technology, Inc. | Secure transmission between a source component and a node device |
US8990844B2 (en) * | 2012-07-05 | 2015-03-24 | Lg Electronics Inc. | Method and apparatus for processing digital service signals |
US20150086067A1 (en) * | 2013-09-20 | 2015-03-26 | Infosys Limited | Methods for scene based video watermarking and devices thereof |
US9179033B2 (en) * | 2000-04-19 | 2015-11-03 | Digimarc Corporation | Digital watermarking in data representing color channels |
US20150324948A1 (en) * | 2014-05-07 | 2015-11-12 | Cisco Technology Inc. | System and Method for Embedding Data |
US20150326393A1 (en) * | 2014-05-09 | 2015-11-12 | Sony Pictures Entertainment Inc. | Content individualization |
US20160212441A1 (en) * | 2015-01-15 | 2016-07-21 | Gopro, Inc. | Inter frame watermark in a digital video |
US20170061563A1 (en) * | 2015-09-01 | 2017-03-02 | Digimarc Corporation | Anti-counterfeiting detection using machine readable indicia |
US9959906B2 (en) * | 2014-02-05 | 2018-05-01 | Nagravision S.A. | Method and a receiver device configured to mark digital media content |
US20180144754A1 (en) * | 2016-11-23 | 2018-05-24 | Ati Technologies Ulc | Video assisted digital audio watermarking |
US20200027187A1 (en) * | 2018-07-20 | 2020-01-23 | Comcast Cable Communications, Llc | Collusion attack prevention |
US10757474B2 (en) * | 2018-04-27 | 2020-08-25 | Twentieth Century Fox Home Entertainment Llc | Method and apparatus for protecting data via application of corrupting function and complimentary restitution at video processing endpoints |
-
2020
- 2020-05-21 US US16/880,912 patent/US11443401B2/en active Active
-
2022
- 2022-09-12 US US17/931,534 patent/US20230005094A1/en not_active Abandoned
Patent Citations (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5832119A (en) * | 1993-11-18 | 1998-11-03 | Digimarc Corporation | Methods for controlling systems using control signals embedded in empirical data |
US5832119C1 (en) * | 1993-11-18 | 2002-03-05 | Digimarc Corp | Methods for controlling systems using control signals embedded in empirical data |
US6449379B1 (en) * | 1993-11-18 | 2002-09-10 | Digimarc Corporation | Video steganography methods avoiding introduction of fixed pattern noise |
US20020186863A1 (en) * | 1994-10-21 | 2002-12-12 | Rhoads Geoffrey B. | Redundantly embedding auxiliary data in source signals |
US6411725B1 (en) * | 1995-07-27 | 2002-06-25 | Digimarc Corporation | Watermark enabled video objects |
US5960081A (en) * | 1997-06-05 | 1999-09-28 | Cray Research, Inc. | Embedding a digital signature in a video sequence |
US20070136597A1 (en) * | 1998-09-25 | 2007-06-14 | Levy Kenneth L | Methods and Apparatus for Robust Embedded Data |
US6823455B1 (en) * | 1999-04-08 | 2004-11-23 | Intel Corporation | Method for robust watermarking of content |
US20060140441A1 (en) * | 1999-09-01 | 2006-06-29 | Marc Miller | Watermarking different areas of digital images with different intensities |
US7188186B1 (en) * | 1999-09-03 | 2007-03-06 | Meyer Thomas W | Process of and system for seamlessly embedding executable program code into media file formats such as MP3 and the like for execution by digital media player and viewing systems |
US20110007935A1 (en) * | 2000-04-19 | 2011-01-13 | Reed Alastair M | Digital Watermarking in Data Representing Color Channels |
US9179033B2 (en) * | 2000-04-19 | 2015-11-03 | Digimarc Corporation | Digital watermarking in data representing color channels |
US20020027612A1 (en) * | 2000-09-07 | 2002-03-07 | Brill Michael H. | Spatio-temporal channel for images |
US20050123169A1 (en) * | 2001-03-08 | 2005-06-09 | Wendt Peter D. | Method to make wavelet watermarks resistant to affine transformations |
US20070223778A1 (en) * | 2001-06-28 | 2007-09-27 | Paola Hobson | Method And Apparatus For Video/Image Communication With Watermarking |
US20040125125A1 (en) * | 2002-06-29 | 2004-07-01 | Levy Kenneth L. | Embedded data windows in audio sequences and video frames |
US20070003102A1 (en) * | 2003-04-17 | 2007-01-04 | Nippon Telegraph And Telephone Corporation | Electronic watermark-containing moving picture transmission system, electronic watermark-containing moving picture transmission method, information processing device, communication control device, electronic watermark-containing moving picture processing program, and storage medium containing electronic watermark-containing |
US20050159831A1 (en) * | 2004-01-21 | 2005-07-21 | Kaliappan Gopalan | Steganographic method for covert audio communications |
US20110055860A1 (en) * | 2004-04-07 | 2011-03-03 | Arun Ramaswamy | Data insertion apparatus and methods for use with compressed audio/video data |
US20090228592A1 (en) * | 2005-08-23 | 2009-09-10 | Macrovision Corporation | Techniques for watermarking and distributing content |
US20080056529A1 (en) * | 2006-09-06 | 2008-03-06 | Bhattacharjya Anoop K | Systems and Methods for Image Watermarking |
US8054969B2 (en) * | 2007-02-15 | 2011-11-08 | Avaya Inc. | Transmission of a digital message interspersed throughout a compressed information signal |
US20110019870A1 (en) * | 2007-12-17 | 2011-01-27 | Csp - Innovazione Nelle Ict Scarl | Embedding interactive data into an audiovisual content by watermarking |
US20110129116A1 (en) * | 2008-07-03 | 2011-06-02 | Thorwirth Niels J | Efficient watermarking approaches of compressed media |
US20100228632A1 (en) * | 2009-03-03 | 2010-09-09 | Rodriguez Tony F | Narrowcasting From Public Displays, and Related Methods |
US8990844B2 (en) * | 2012-07-05 | 2015-03-24 | Lg Electronics Inc. | Method and apparatus for processing digital service signals |
US20140325205A1 (en) * | 2012-07-12 | 2014-10-30 | Xsette Technology, Inc. | Secure transmission between a source component and a node device |
US20140047475A1 (en) * | 2012-07-16 | 2014-02-13 | Lg Electronics Inc. | Method and apparatus for processing digital service signals |
US20140270337A1 (en) * | 2013-03-14 | 2014-09-18 | Verance Corporation | Transactional video marking system |
US20140270331A1 (en) * | 2013-03-15 | 2014-09-18 | Rimage Corporation | Content watermarking |
US20150086067A1 (en) * | 2013-09-20 | 2015-03-26 | Infosys Limited | Methods for scene based video watermarking and devices thereof |
US9959906B2 (en) * | 2014-02-05 | 2018-05-01 | Nagravision S.A. | Method and a receiver device configured to mark digital media content |
US20150324948A1 (en) * | 2014-05-07 | 2015-11-12 | Cisco Technology Inc. | System and Method for Embedding Data |
US9208534B2 (en) * | 2014-05-07 | 2015-12-08 | Cisco Technology Inc. | System and method for embedding data |
US20150326393A1 (en) * | 2014-05-09 | 2015-11-12 | Sony Pictures Entertainment Inc. | Content individualization |
US20160212441A1 (en) * | 2015-01-15 | 2016-07-21 | Gopro, Inc. | Inter frame watermark in a digital video |
US20170061563A1 (en) * | 2015-09-01 | 2017-03-02 | Digimarc Corporation | Anti-counterfeiting detection using machine readable indicia |
US20180144754A1 (en) * | 2016-11-23 | 2018-05-24 | Ati Technologies Ulc | Video assisted digital audio watermarking |
US10757474B2 (en) * | 2018-04-27 | 2020-08-25 | Twentieth Century Fox Home Entertainment Llc | Method and apparatus for protecting data via application of corrupting function and complimentary restitution at video processing endpoints |
US20200027187A1 (en) * | 2018-07-20 | 2020-01-23 | Comcast Cable Communications, Llc | Collusion attack prevention |
Also Published As
Publication number | Publication date |
---|---|
US11443401B2 (en) | 2022-09-13 |
US20210366074A1 (en) | 2021-11-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230005094A1 (en) | Digital watermarking | |
Liao et al. | A steganographic method for digital images with four-pixel differencing and modified LSB substitution | |
Xiong et al. | Robust reversible watermarking in encrypted image with secure multi-party based on lightweight cryptography | |
Li et al. | Reversible data hiding in encrypted images using cross division and additive homomorphism | |
Yu et al. | Digital watermarking based on neural networks for color images | |
Wu et al. | Data hiding in image and video. II. Designs and applications | |
Tseng et al. | A secure data hiding scheme for binary images | |
Balasubramanian et al. | High payload image steganography with reduced distortion using octonary pixel pairing scheme | |
US20070003102A1 (en) | Electronic watermark-containing moving picture transmission system, electronic watermark-containing moving picture transmission method, information processing device, communication control device, electronic watermark-containing moving picture processing program, and storage medium containing electronic watermark-containing | |
US11670099B2 (en) | Validating objects in volumetric video presentations | |
Li et al. | A modified reversible data hiding in encrypted images using random diffusion and accurate prediction | |
Wu | Multimedia data hiding | |
Weir | Visual cryptography and its applications | |
Ho et al. | High-capacity reversible data hiding in binary images using pattern substitution | |
JP6543764B2 (en) | Security authentication method for digital video content and system therefor | |
McKeon | Strange Fourier steganography in movies | |
Ye et al. | Noise-free thumbnail-preserving image encryption based on MSB prediction | |
Vashistha et al. | Watermarking video content using visual cryptography and scene averaged image | |
US20220182721A1 (en) | Generating personalized synthesized media | |
Kaur et al. | XOR-EDGE based video steganography and testing against chi-square steganalysis | |
Gangarde et al. | Authenticate audio video-crypto invisible watermarking approach for enhancing hidden information security and robustness | |
CN104050624B (en) | A kind of digital picture steganography method | |
Riaz et al. | A robust multimedia authentication and restoration scheme in digital photography | |
Ahuja et al. | Secure and robust watermarking scheme based on motion features for video object | |
Yang et al. | Robust track‐and‐trace video watermarking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: AT&T INTELLECTUAL PROPERTY I, L.P., GEORGIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BEATTIE, JAMES GORDON, JR.;PEITZER, HAYWOOD S.;SIGNING DATES FROM 20200515 TO 20210407;REEL/FRAME:061574/0642 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |