WO2000004422A2 - Method for image processing to facilitate copy protection - Google Patents
Method for image processing to facilitate copy protectionInfo
- Publication number
- WO2000004422A2 WO2000004422A2 PCT/US1999/016515 US9916515W WO2000004422A2 WO 2000004422 A2 WO2000004422 A2 WO 2000004422A2 US 9916515 W US9916515 W US 9916515W WO 2000004422 A2 WO2000004422 A2 WO 2000004422A2
- Authority
- WO
- Grant status
- Application
- Patent type
- Prior art keywords
- string
- invention
- values
- picture
- copy
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0078—Robust watermarking, e.g. average attack or collusion attack resistant using multiple thresholds
Abstract
Description
METHOD FOR IMAGE PROCESSING TO FACILITATE COPY PROTECTION
BACKGROUND OF THE INVENTION Technical Field
The present invention relates generally to securing content against wrongful duplication and, more particularly, techniques for processing an image into a digital string so that images with similar features (e.g., illicit or cropped copies) get mapped into a digital string that is close to the original string. Description of the Related Art
The proliferation of digitized media and the ease with which digital files can be copied especially over public computer networks (e.g., the Internet) has created a need for copy and copyright enforcement schemes. Conventional cryptographic systems permit only valid keyholders access to encrypted data, but once such data is decrypted there is no way to track its reproduction or retransmission. Such schemes thus provide insufficient protection against unauthorized reproduction of information. It is known in the prior art to provide a so-called digital "watermark" on a document to address this problem. A "watermark" is a visible or preferably invisible identification code that is permanently embedded in the data and thus remains present within the data after any decryption process. One example of a digital watermark would be a visible "seal" placed over an image to identify the copyright owner. However, the watermark might also contain additional information, including the identity of the purchaser of a particular copy of the material.
Many schemes have been proposed for watermarking digital data. In a known watermarking procedure, each copy of a document D is varied slightly so as to look the same to the user but also so as to include the identity of the purchaser. The watermark consists of the variations that are unique to each copy. The idea behind such schemes is that the watermark should be hard to remove without destroying the document. Thus, a copy of a watermarked document should be traceable back to the specific version of the original from which it was created. Although certain watermarking techniques provide advantages, there remains a need for a more general approach to the problems associated with content protection.
SUMMARY OF THE INVENTION It is a primary object of the present invention to provide an improved method for securing content against wrongful duplication. It is still another object of this invention to provide improved methods for processing an image (or other work) into a digital string so that images with similar features (e.g., illicit or cropped copies) get mapped into a digital string that is close to the original digital string. It is another more general object of this invention to protect against the wrongful proliferation of digitized media over public computer networks (e.g., the Internet).
A still further object of this invention is to provide for more efficient and reliable copy and copyright enforcement schemes.
The above as well as additional objects, features, and advantages of the present invention will become apparent in the following detailed written description. BRIEF DESCRIPTION OF THE DRAWINGS
The novel features believed characteristic of the invention are set forth in the appended claims The invention itself however, as well as a preferred mode of use, further objects and advantages thereof, are best understood by reference to the following Detailed Description of an illustrative embodiment when read in conjunction with the accompanying Drawings, wherein: Figure 1 is a flowchart of the inventive method.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT The present invention is preferably implemented in software (e.g., a series of program instructions) executed in a computer. It is assumed that the content to be protected in a picture or other image. The invention may be applied to any content (including, without limitation, video, graphics, sound, text, etc.) irrespective of its form, however. Forpuφoses of illustration, the invention will be described in the context of a picture. The picture is digitized in any convenient manner.
According to the invention, once digitized, the picture is run through a hashing algorithm and reduced to approximately thirty (30) bits so that most any other picture that was a small modification of the original gets mapped to the same string (with maybe a couple of bits different). This is useful in watermarking since this string, then, could be used as part of x_l, ..., x_n when one uses H(x_l ... x_n|Do not copy) as an offset watermark. When this approach is followed, the watermark used for different pictures is different (which makes it harder for the adversary to remove), but it is still possible for someone who knows H to regenerate the watermark. In particular, the watermark used for different pictures is different (which makes it harder for the adversary to remove) but it is still possible for someone who knows H to regenerate the watermark for a correlation test (without access to a database), since even if the adversary changes the picture a little, he cannot change the string x_l, ..., x_n very much; so, it is possible to later regenerate the original x_l, ..., x_n by computing the derived values from the picture and trying all possibilities that are within a few bits.
Such a mapping function is also useful in Web search engines. For example, assume one wants to search for copies of a document/picture on the Web even if such copies are changed a little bit. One could use the present invention and compute the string for every candidate picture on the Web and see which ones were close to the string for the original. From this information, one could check the candidates that match by eye, thereby cutting the search space by a huge factor. There may also be applications in the domain of organizing pictorial data into similarity classes, which could be done according to the digital string produced by the following algorithm.
Implementation
With reference now to the flowchart of Figure 1, the inventive mapping scheme has a number of steps. Step 1 : generate m x n N(0,1) random variables Z_(l,l), ..., Z_(m,n). Store these values in an m x n matrix Z*. These values will be used for all documents and will be kept secret.
This may be done in an off-line process.
Step 2: convert the document into a digital string y_l, ..., y_n using any standard method.
If possible, normalize the y_i values so that over the universe of all documents, y_i can be thought of as a N(0, 1 ) random variable. (The latter step is not required, but it makes the process work better.) Treat the n values as a vector y*.
Step 3: compute the matrix-vector product v* = Z*xy*. Let v_l, ..., v_m denote the values of v*. Note that each v_i can be thought of as a normal random variable, no matter what the y values are. For example, the mean of each v_i is M - (y_l + ... + y_m)/m. Step 4: compute two thresholds t' and t" as follows. Select t' so that the probability that y_l x u_l + ... + y_m x u_m <t' is close to about 1/4 when each u_i is an independent N(0,1) random variable. Select t" so that the probability that y_l x u_l + ... + y_m x u_m > t" is close to about 1/4. There are many possible variations of this step, e.g., one with just one threshold at the value t =M, or by adjusting the two threshold values. Step 5: For each of i, if v_i <t' or if v_i >t", then set b_i = 0. Otherwise, set b_i = 1.
(Note that each b_i will be equally likely to be 0 or 1.) The values b_l, ..., b__m form the desired bit string for the document. The mapping function reduces the content (to be protected) from a large number of bytes to a string having a small number of bits. Changing just a few values of y* (or all of the values of y* by a little bit), however, does not have a meaningful effect on the values of b* that are computed. For example, in order to change the value of b_j, the adversary must change enough of the y_i's by enough so that the corresponding vj is pushed across a threshold. Without knowing the Z* values, this is hard for the adversary to do if he is restricted to making small changes in the y_i's (since most of the yj's are not likely to be very near a threshold in the first place). In fact, there is a formal mathematical proof that says that the amount by which the adversary is required to change the y_i's to effect a significant change in the bj's is the maximum possible for any scheme.
Thus, the mapping function (when applied to copies of the document) is quite useful for copy protection purposes. Generalizing, the technique described above creates a first string from a picture (or other work) with the property that if one modifies the picture by some given degree (e.g., through intentional variation or perhaps merely through aging), a second string (generated by the inventive technique) and associated with the modified picture is not meaningfully distinct from the first string. The invention can be used to reduce a picture (or other work) comprising a large number of bytes into a string having a small number of bits, and thus pictures that are similar result in the same or similar strings. As a result, an owner of the content sought to be protected may apply the algorithm to copies of the work for copy protection puφoses. As described above, aspects of the present invention pertain to specific "method steps" implementable on one or more computers. In an alternate embodiment, the invention may be implemented as a computer program product for use with a computer system. Those skilled in the art should readily appreciate that programs defining the functions of the present invention can be delivered to a computer in many forms, which include, but are not limited to: (a) information permanently stored on non-writable storage media (e.g. read only memory devices within a computer such as ROM or optical disks readable by CD-ROM drive); (b) information alterably stored on writable storage media (e.g., floppy disks within a diskette drive or a hard disk drive); or (c) information conveyed to a computer through communication media, such as through a computer or telephone or other network. It should be understood, therefore, that such media, when carrying computer readable instructions that direct the method functions of the present invention, represent alternate embodiments of the present invention. In addition, although the various methods described are conveniently implemented in a general puφose computer selectively activated or reconfigured by software, one of ordinary skill in the art would also recognize that such methods may be carried out in hardware, in firmware, or in more specialized apparatus (e.g., a secure chip) constructed to perform the required method steps.
While the invention has been particularly shown and described with reference to a preferred embodiment, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention.
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12002398 true | 1998-07-17 | 1998-07-17 | |
US09/120,023 | 1998-07-17 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA 2304041 CA2304041C (en) | 1998-07-17 | 1999-07-19 | Method for image processing to facilitate copy protection |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2000004422A2 true true WO2000004422A2 (en) | 2000-01-27 |
WO2000004422A3 true WO2000004422A3 (en) | 2000-04-20 |
Family
ID=22387830
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1999/016515 WO2000004422A3 (en) | 1998-07-17 | 1999-07-19 | Method for image processing to facilitate copy protection |
Country Status (2)
Country | Link |
---|---|
CA (1) | CA2304041C (en) |
WO (1) | WO2000004422A3 (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6405219B2 (en) | 1999-06-22 | 2002-06-11 | F5 Networks, Inc. | Method and system for automatically updating the version of a set of files stored on content servers |
US6473802B2 (en) | 1999-07-15 | 2002-10-29 | F5 Networks, Inc. | Method and system for storing load balancing information with an HTTP cookie |
US7047301B2 (en) | 2000-01-31 | 2006-05-16 | F5 Networks, Inc. | Method and system for enabling persistent access to virtual servers by an LDNS server |
US7146354B1 (en) | 1999-06-18 | 2006-12-05 | F5 Networks, Inc. | Method and system for network load balancing with a compound data structure |
US7343413B2 (en) | 2000-03-21 | 2008-03-11 | F5 Networks, Inc. | Method and system for optimizing a network by independently scaling control segments and data flow |
US7441045B2 (en) | 1999-12-13 | 2008-10-21 | F5 Networks, Inc. | Method and system for balancing load distribution on a wide area network |
US7975025B1 (en) | 2008-07-08 | 2011-07-05 | F5 Networks, Inc. | Smart prefetching of data over a network |
US8059816B2 (en) * | 2005-05-13 | 2011-11-15 | Temple University Of The Commonwealth System Of Higher Education | Secret sharing technique with low overhead information content |
US9077554B1 (en) | 2000-03-21 | 2015-07-07 | F5 Networks, Inc. | Simplified method for processing multiple connections from the same client |
US9083760B1 (en) | 2010-08-09 | 2015-07-14 | F5 Networks, Inc. | Dynamic cloning and reservation of detached idle connections |
US9154423B1 (en) | 2012-05-01 | 2015-10-06 | F5 Networks, Inc. | Minimize SYN-flood issues with flow cache while maintaining performance |
US9203771B1 (en) | 2012-07-23 | 2015-12-01 | F5 Networks, Inc. | Hot service flow hardware offloads based on service priority and resource usage |
US9210163B1 (en) | 2002-09-03 | 2015-12-08 | F5 Networks, Inc. | Method and system for providing persistence in a secure network access |
US9338095B2 (en) | 2012-05-01 | 2016-05-10 | F5 Networks, Inc. | Data flow segment optimized for hot flows |
US9525632B1 (en) | 2012-05-01 | 2016-12-20 | F5 Networks, Inc. | Minimize recycle SYN issues for split TCP hot flows to improve system reliability and performance |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9313047B2 (en) | 2009-11-06 | 2016-04-12 | F5 Networks, Inc. | Handling high throughput and low latency network data packets in a traffic management device |
US8868961B1 (en) | 2009-11-06 | 2014-10-21 | F5 Networks, Inc. | Methods for acquiring hyper transport timing and devices thereof |
US9141625B1 (en) | 2010-06-22 | 2015-09-22 | F5 Networks, Inc. | Methods for preserving flow state during virtual machine migration and devices thereof |
US8908545B1 (en) | 2010-07-08 | 2014-12-09 | F5 Networks, Inc. | System and method for handling TCP performance in network access with driver initiated application tunnel |
US8886981B1 (en) | 2010-09-15 | 2014-11-11 | F5 Networks, Inc. | Systems and methods for idle driven scheduling |
WO2012058643A8 (en) | 2010-10-29 | 2012-09-07 | F5 Networks, Inc. | System and method for on the fly protocol conversion in obtaining policy enforcement information |
US8959571B2 (en) | 2010-10-29 | 2015-02-17 | F5 Networks, Inc. | Automated policy builder |
US9246819B1 (en) | 2011-06-20 | 2016-01-26 | F5 Networks, Inc. | System and method for performing message-based load balancing |
US9270766B2 (en) | 2011-12-30 | 2016-02-23 | F5 Networks, Inc. | Methods for identifying network traffic characteristics to correlate and manage one or more subsequent flows and devices thereof |
US9231879B1 (en) | 2012-02-20 | 2016-01-05 | F5 Networks, Inc. | Methods for policy-based network traffic queue management and devices thereof |
US9172753B1 (en) | 2012-02-20 | 2015-10-27 | F5 Networks, Inc. | Methods for optimizing HTTP header based authentication and devices thereof |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5587984A (en) * | 1994-09-13 | 1996-12-24 | Sony Corporation | Hologram printed on optical recording medium for copy protection |
US5875249A (en) * | 1997-01-08 | 1999-02-23 | International Business Machines Corporation | Invisible image watermark for image verification |
US5915027A (en) * | 1996-11-05 | 1999-06-22 | Nec Research Institute | Digital watermarking |
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5587984A (en) * | 1994-09-13 | 1996-12-24 | Sony Corporation | Hologram printed on optical recording medium for copy protection |
US5915027A (en) * | 1996-11-05 | 1999-06-22 | Nec Research Institute | Digital watermarking |
US5875249A (en) * | 1997-01-08 | 1999-02-23 | International Business Machines Corporation | Invisible image watermark for image verification |
Non-Patent Citations (2)
Title |
---|
COX ET AL.: 'Secure, Imperceptable Yet Perceptually Salient, Spread Spectrum Watermark for Multimedia' PROCEEDINGS OF THE 1996 IEEE SOUTHCON CONFERENCE June 1996, pages 192 - 197, XP002927251 * |
DELAIGLE ET AL.: 'A Psychovisual Approach for Digital Picture Watermarking' JOURNAL OF ELECTRONIC IMAGING vol. 7, no. 3, July 1998, pages 628 - 640, XP000771769 * |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7590625B1 (en) | 1999-06-18 | 2009-09-15 | F5 Networks, Inc. | Method and system for network load balancing with a compound data structure |
US7146354B1 (en) | 1999-06-18 | 2006-12-05 | F5 Networks, Inc. | Method and system for network load balancing with a compound data structure |
US7707182B1 (en) | 1999-06-22 | 2010-04-27 | F5 Networks, Inc. | Method and system for automatically updating the version of a set of files stored on content servers |
US7113962B1 (en) | 1999-06-22 | 2006-09-26 | F5 Networks, Inc. | Method and system for automatically updating content stored on servers connected by a network |
US6405219B2 (en) | 1999-06-22 | 2002-06-11 | F5 Networks, Inc. | Method and system for automatically updating the version of a set of files stored on content servers |
US6473802B2 (en) | 1999-07-15 | 2002-10-29 | F5 Networks, Inc. | Method and system for storing load balancing information with an HTTP cookie |
US7441045B2 (en) | 1999-12-13 | 2008-10-21 | F5 Networks, Inc. | Method and system for balancing load distribution on a wide area network |
US7707289B1 (en) | 2000-01-31 | 2010-04-27 | F5 Networks, Inc. | Method and system for enabling persistent access to virtual servers by an LDNS server |
US7047301B2 (en) | 2000-01-31 | 2006-05-16 | F5 Networks, Inc. | Method and system for enabling persistent access to virtual servers by an LDNS server |
US9077554B1 (en) | 2000-03-21 | 2015-07-07 | F5 Networks, Inc. | Simplified method for processing multiple connections from the same client |
US9647954B2 (en) | 2000-03-21 | 2017-05-09 | F5 Networks, Inc. | Method and system for optimizing a network by independently scaling control segments and data flow |
US7343413B2 (en) | 2000-03-21 | 2008-03-11 | F5 Networks, Inc. | Method and system for optimizing a network by independently scaling control segments and data flow |
US9210163B1 (en) | 2002-09-03 | 2015-12-08 | F5 Networks, Inc. | Method and system for providing persistence in a secure network access |
US8059816B2 (en) * | 2005-05-13 | 2011-11-15 | Temple University Of The Commonwealth System Of Higher Education | Secret sharing technique with low overhead information content |
US7975025B1 (en) | 2008-07-08 | 2011-07-05 | F5 Networks, Inc. | Smart prefetching of data over a network |
US8326923B1 (en) | 2008-07-08 | 2012-12-04 | F5 Networks, Inc. | Smart prefetching of data over a network |
US9083760B1 (en) | 2010-08-09 | 2015-07-14 | F5 Networks, Inc. | Dynamic cloning and reservation of detached idle connections |
US9762492B2 (en) | 2012-05-01 | 2017-09-12 | F5 Networks, Inc. | Data flow segment optimized for hot flows |
US9338095B2 (en) | 2012-05-01 | 2016-05-10 | F5 Networks, Inc. | Data flow segment optimized for hot flows |
US9525632B1 (en) | 2012-05-01 | 2016-12-20 | F5 Networks, Inc. | Minimize recycle SYN issues for split TCP hot flows to improve system reliability and performance |
US9154423B1 (en) | 2012-05-01 | 2015-10-06 | F5 Networks, Inc. | Minimize SYN-flood issues with flow cache while maintaining performance |
US9596184B1 (en) | 2012-07-23 | 2017-03-14 | F5 Networks, Inc. | Hot service flow hardware offloads based on service priority and resource usage |
US9203771B1 (en) | 2012-07-23 | 2015-12-01 | F5 Networks, Inc. | Hot service flow hardware offloads based on service priority and resource usage |
Also Published As
Publication number | Publication date | Type |
---|---|---|
CA2304041A1 (en) | 2000-01-27 | application |
CA2304041C (en) | 2004-06-01 | grant |
WO2000004422A3 (en) | 2000-04-20 | application |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Agrawal et al. | Watermarking relational databases | |
US6961854B2 (en) | Methods and systems for encoding and protecting data using digital signature and watermarking techniques | |
Morkel et al. | An overview of image steganography. | |
US6504941B2 (en) | Method and apparatus for digital watermarking of images | |
Amin et al. | Information hiding using steganography | |
US6674861B1 (en) | Digital audio watermarking using content-adaptive, multiple echo hopping | |
US6885748B1 (en) | System and method for protection of digital works | |
Rey et al. | A survey of watermarking algorithms for image authentication | |
US5745569A (en) | Method for stega-cipher protection of computer code | |
Anderson et al. | The steganographic file system | |
Agrawal et al. | Watermarking relational data: framework, algorithms and analysis | |
Holliman et al. | Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes | |
Lu et al. | Enabling search over encrypted multimedia databases | |
Li | Digital fragile watermarking scheme for authentication of JPEG images | |
US5905800A (en) | Method and system for digital watermarking | |
US20030118208A1 (en) | Varying segment sizes to increase security | |
Barni et al. | Watermark embedding: Hiding a signal within a cover image | |
US20060212704A1 (en) | Forensic for fingerprint detection in multimedia | |
Kumar et al. | Steganography-A data hiding technique | |
US20030191938A1 (en) | Computer security system and method | |
US20020069363A1 (en) | System and method for data recovery and protection | |
Li et al. | Fingerprinting relational databases: Schemes and specialties | |
EP0459046A1 (en) | Computer software protection | |
US6671407B1 (en) | System and method for hashing digital images | |
Popa | An analysis of steganographic techniques |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AU CA JP |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
ENP | Entry into the national phase in: |
Ref country code: CA Ref document number: 2304041 Kind code of ref document: A Format of ref document f/p: F Ref document number: 2304041 Country of ref document: CA |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AU CA JP |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
122 | Ep: pct application non-entry in european phase |