US20020097873A1 - Apparatus and method for embedding and extracting information in analog signals using replica modulation - Google Patents
Apparatus and method for embedding and extracting information in analog signals using replica modulation Download PDFInfo
- Publication number
- US20020097873A1 US20020097873A1 US09/106,213 US10621398A US2002097873A1 US 20020097873 A1 US20020097873 A1 US 20020097873A1 US 10621398 A US10621398 A US 10621398A US 2002097873 A1 US2002097873 A1 US 2002097873A1
- Authority
- US
- United States
- Prior art keywords
- signal
- stego
- replica
- cover
- auxiliary
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B27/00—Editing; Indexing; Addressing; Timing or synchronising; Monitoring; Measuring tape travel
- G11B27/02—Editing, e.g. varying the order of information signals recorded on, or reproduced from, record carriers
- G11B27/031—Electronic editing of digitised analogue information signals, e.g. audio or video signals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/10009—Improvement or modification of read or write signals
- G11B20/10046—Improvement or modification of read or write signals filtering or equalising, e.g. setting the tap weights of an FIR filter
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/10009—Improvement or modification of read or write signals
- G11B20/10222—Improvement or modification of read or write signals clock-related aspects, e.g. phase or frequency adjustment or bit synchronisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04H—BROADCAST COMMUNICATION
- H04H20/00—Arrangements for broadcast or for distribution combined with broadcast
- H04H20/28—Arrangements for simultaneous broadcast of plural pieces of information
- H04H20/30—Arrangements for simultaneous broadcast of plural pieces of information by a single channel
- H04H20/31—Arrangements for simultaneous broadcast of plural pieces of information by a single channel using in-band signals, e.g. subsonic or cue signal
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0052—Embedding of the watermark in the frequency domain
Definitions
- This invention relates to apparatus and methods for encoding or embedding and decoding or extracting information in analog signals, such as audio, video and data signals, either transmitted by radio wave transmission or wired transmission, or stored in a recording medium such as optical or magnetic disks, magnetic tape, or solid state memory.
- the present invention is concerned with techniques for embedding and extracting auxiliary information within an existing signal, such as an audio or video signal.
- An area of particular interest to certain embodiments of the present invention relates to the market for musical recordings.
- a large number of people listen to musical recordings on radio or television. They often hear a recording which they like enough to purchase, but don't know the name of the song, the artist performing it, or the record, tape, or CD album of which it is part.
- the number of recordings which people purchase is less than it otherwise would be if there was a simple way for people to identify which of the recordings that they hear on the radio or TV they wish to purchase.
- copy control also referred to as digital watermarking
- audio software products such as musical recordings.
- One of the problems in this market is the ease of copying such products without paying those who produce them.
- This problem is becoming particularly troublesome with the advent of recording techniques, such as digital audio tape (DAT), which make it possible for copies to be of very high quality.
- DAT digital audio tape
- Yet another field of interest relating to the present invention pertains to automatic royalty tracking and proof of performance of copyrighted material or commercial advertisements, by which copyright owners are able to track public performances or broadcasts of their material for royalty payment purposes, and advertisers are able to confirm that commercials which they have paid for were actually broadcast at the proper time and date.
- Still another area of interest to the present invention relates to integrity verification or tampering detection, wherein the creator of an audio or audiovisual work can determine whether it has been altered, modified or incorporated into another work.
- an encoder samples the audio signal, delays the signal while calculating the signal level, and determines during the delay whether or not to add the data signal and, if so, at what signal level.
- the later Best et al. patent also notes that the “pseudo-random manner” in moving the notches makes the data signals more difficult to detect audibly.
- the prior art fails to provide a method and an apparatus for embedding and extracting auxiliary analog or digital information signals onto analog audio or video frequency signals for producing humanly perceived transmissions (i.e., sounds or images) such that the audio or video frequency signals produce substantially identical humanly perceived transmission prior to as well as after encoding with the auxiliary signals (in other words, the embedded information is transparent to the listener or viewer), which is also robust to a high degree of signal distortions caused by noisy transmission mediums, etc.
- the prior art also fails to provide relatively simple and inexpensive apparatus and methods for embedding and extracting signals defining auxiliary information into audio or video frequency signals for producing humanly perceived audio transmissions.
- the present invention provides apparatus and methods for embedding or encoding, and extracting or decoding, auxiliary (analog or digital) information in an analog host or cover signal in a way which has minimal impact on the perception of the source information when the analog signal is applied to an appropriate output device, such as a speaker, a display monitor, or other electrical/electronic device.
- the present invention further provides apparatus and methods for embedding and extracting machine readable signals in an analog cover signal which control the ability of a device to copy the cover signal.
- the present invention provides for the encoding or embedding of an auxiliary signal in an analog host or cover signal, by generating a replica signal from the cover signal, modifying the replica signal as a function of the auxiliary signal, and inserting the modified replica signal back into the analog cover signal to provide a stego signal.
- the invention further provides for the extraction of embedded auxiliary signals from stego signals by generating a replica of the stego signal, and correlating the replica with the stego signal.
- apparatus for embedding and extracting auxiliary signals in an analog cover signal comprising a replica generator for generating a replica signal from the cover signal, a modulator for modifying the replica signal as a function of the auxiliary signal, an adder for inserting the modified replica signal back into the analog cover signal to produce a stego signal, a receiver for receiving the stego signal, a generator for generating a replica signal from the stego signal, a modulator for modifying the received stego signal as a function of the replica signal of the received stego signal, and an extractor for extracting the auxiliary signal by filtering the modified received stego signal.
- cover signal refers to a host or source signal, such as an audio, video or other information signal, which carries or is intended to carry embedded or hidden auxiliary data.
- FIG. 1 is a block diagram of a data signal embedding and extracting process utilized by the present invention
- FIG. 2 is a block diagram of one embodiment of the embeddor 10 of FIG. 1;
- FIG. 3 is a block diagram of one embodiment of the embedded signal generator 11 of FIG. 2;
- FIG. 4 is a block diagram of one embodiment of the data signal extractor 20 according to the present invention.
- FIG. 5 is a block diagram of one embodiment of a replica generator which produces a cover signal replica shifted in frequency from the original;
- FIGS. 6 ( a )- 6 ( c ) are graphs showing a set of orthogonal functions used in the creation of an amplitude-shifted replica according to one embodiment of the present invention.
- the present invention is directed to a method and apparatus for embedding information or data onto a cover signal, such as an audio signal, video signal, or other analog signal (hereinafter called a “cover signal”), by generating a replica of the cover signal within a predefined frequency, time and/or space domain, modulating the replica with an auxiliary signal representing the information to be added to the cover signal, and then inserting the modulated replica back into the cover signal.
- a cover signal such as an audio signal, video signal, or other analog signal
- the invention can implemented in a number of different ways, either by software programming of a digital processor, in the form of analog, digital, or mixed-signal integrated circuits, as a discrete component electronic device, or a combination of such implementations.
- the replica is similar to the cover signal in time and frequency domain content, but different in certain parameters as specified by a stego key, which is not generally known, but which is known at authorized receiving apparatus.
- the invention employs an embeddor 10 to generate a stego signal 4 , which is substantially the same in terms of the content and quality of information carried by a cover signal 2 .
- cover signal 2 is a video or audio signal
- the stego signal 4 will produce essentially the same video or audio program or information when applied to an output device such as a video display or loudspeaker.
- a stego key 9 is used to determine and specify the particular region of the time, frequency and/or space domain of the replica where the auxiliary signal 6 is to be embedded, as well as the parameters of the embedding process.
- the embeddor then appropriately modulates or modifies the replica and adds the replica back into the cover signal to obtain a stego signal 4 .
- Stego signal 4 can be transmitted, or stored in a storage medium such as magnetic tape, CD-ROM, solid state memory, and the like for later recall and/or transmission.
- the embedded auxiliary signal is recovered by an extractor 20 , having knowledge of or access to the stego key 9 , which operates on the stego signal 4 to extract the auxiliary signal 6 .
- ⁇ overscore (s) ⁇ (t) represents the stego signal 4
- s(t) represents the cover signal 2
- w i (t) is the i-th hidden signal 8 (see FIG. 2), also known as a watermark.
- the embeddor can be used to insert multiple auxiliary signals 6 simultaneously, using a different stego key 9 for each signal. In the case where only a single auxiliary signal 6 is to be inserted, a single stego key 9 is used, and there would be only one hidden signal w(t).
- equation (1) and hereinafter, a one-dimensional signal i.e.
- a signal varying according to a single dimension, such as time is considered for purposes of simplicity in explanation; however, the present invention is not limited to one-dimensional signals but can be readily extended to multidimensional signals such as images (two dimensions), video (three dimensions), etc., by defining t as a vector.
- a replica of the cover signal 2 itself is used as a carrier for the auxiliary signal 6 . Because the replica is inherently similar to the cover signal in terms of frequency content, no analysis of the cover signal is necessary in order to hide an auxiliary signal, such as a digital watermark.
- auxiliary signals are embedded in the form of a pseudorandom sequence (Preuss et al.) or in the form of multiple tones distributed over the frequency band of the cover signal (Jensen et al.).
- Preuss et al. pseudorandom sequence
- Jasen et al. multiple tones distributed over the frequency band of the cover signal
- Such analysis is based on the phenomenon that human perception will not detect a smaller signal in the presence of a larger signal if the two signals are sufficiently similar. This phenomenon is usually known as the masking effect.
- the embedded signal 8 according to the present invention can be expressed by the formula:
- g i ⁇ 1 is a gain (scaling factor) parameter determined by tradeoff considerations of robustness versus transparency
- m l (t) is the auxiliary signal 6 , wherein
- the gain factor g i can be a predetermined constant for a given application, or it can be adaptable, such that dynamic changes in transparency and robustness conditions can be taken into account. For example, in highly tonal musical passages the gains can be lower, while for spectrally rich or noisy audio signals the gains can be higher, with equivalent levels of transparency.
- the embeddor can perform an extractor process simulation to identify signals having less than desirable detectability, and increase the gain accordingly.
- FIG. 2 shows a block diagram of one preferred embodiment of the embeddor 10 .
- the cover signal 2 , stego key 9 , and auxiliary signal 6 are inputted to an embedded signal generator 11 .
- the embedded signal generator generates replica r i (t) from cover signal 2 according to the stego key 9 , modulates or modifies the replica r i (t) with auxiliary signal 6 (m l (t)), scales the result using gain parameter g 1 , and generates an embedded signal 8 (w i (t)).
- the embedded signal 8 is then added to the cover signal 2 (s(t)) in an adder 12 , to produce the stego signal 4 ( ⁇ overscore (s) ⁇ (t)).
- the replica r i (t) is obtained by taking a portion of the cover signal 2 within a specified time, frequency and/or spatial domain as specified by the stego key 9 , and then making slight modifications to the signal portion, also as specified by the stego key 9 .
- the modifications to the signal portion need to be small to ensure that the replica remains similar to the cover signal as judged by the human psychoacoustic-psychovisual systems, but such modifications must be large enough to be detectable by an appropriately designed extractor having knowledge of or access to the stego key 9 . As will be discussed below, a number of different types of modifications have been found to satisfy these requirements.
- Equation (2) reveals that the replica r i (t) is modulated by the auxiliary signal m i (t) according to a process known as product modulation.
- Product modulation results in a broadening of the spectrum of the embedded signal proportionally to the spectral width of the auxiliary signal.
- the spectrum of the auxiliary signal In order to make the spectrum of the embedded signal similar to the spectrum of the cover signal (to preserve the transparency of the embedding process) the spectrum of the auxiliary signal must be narrow in comparison with the lowest frequency in the spectrum of the replica. This requirement imposes a limit on the capacity of the auxiliary channel, and dictates that low frequency components of the cover signal are unsuitable for inclusion in the creation of the replica.
- N is the number of binary digits or bits in the message
- b n ⁇ ( ⁇ 1, 1) is the n-th bit value
- T is the bit interval
- h(t) represents the shape of the pulse representing the bit.
- h(t) is obtained by low-pass filtering a rectangular pulse so as to restrict the spectral width of the modulating (auxiliary) signal.
- FIG. 3 illustrates the details of an embedded signal generator 11 used to generate a single embedded data message.
- the cover signal 2 is filtered and/or masked in filtering/masking block 30 to produce a filtered/masked signal 31 .
- the filter/mask block 30 separates regions of the cover signal used for different embedded messages.
- the filtered/masked signal 31 is comprised of the selected regions of the cover signal, as specified by stego key 9 , which are then used for creation of the replica signal 41 .
- the signal 31 is then inputted to a replica creator 40 , where predetermined parameters of the signal are modified, as specified by stego key 9 , to create the replica r i (t) 41 .
- the replica 41 is then modulated by the auxiliary signal m i (t) in multiplier 42 a , and the resultant signal is then scaled in multiplier 42 b according to the selected gain factor g i to produce embedded signal component 8 (i.e., w i (t) in equation (2)).
- the embedded signal component 8 is then added back to the cover signal 2 in adder 12 (FIG. 2) to obtain the stego signal 4 .
- adder 12 FIG. 2
- inherent processing delays present in the filter/mask block 30 and replica creator block 40 are compensated for by adding equivalent an delay in the cover signal circuit path (between the cover signal input and the adder 12 ) shown in FIG. 2.
- auxiliary data signals in the cover signal 2 , by using multiple embedded signal generators, each using a different stego key to modify a different feature of the cover signal and/or to use different regions of the cover signal, so as to produce multiple embedded signal components each of which are added to the cover signal 2 .
- the different data signals may be embedded in a cascade fashion, with the output of one embeddor becoming the input of another embeddor using a different stego key. In either alternative interference between embedded signal components must be minimized. This can be accomplished by using non-overlapping frequency, time or space regions of the signal, or by selecting appropriate replica creation parameters, as disclosed below.
- FIG. 4 A block diagram of an extractor used to recover the auxiliary data embedded in the stego signal is shown in FIG. 4.
- the stego signal 4 is filtered/masked in filter/mask module 30 a to isolate the regions where the auxiliary data is embedded.
- the filtered signal 31 a is inputted to replica creator 40 a where a replica ⁇ overscore (r) ⁇ i (t) 41 a of the stego signal is generated in the same manner as the replica r l (t) of the cover signal in the replica creator block 40 in the embeddor, using the same stego key 9 .
- R(m i (t)r l (t)) represents the replica of the modulated cover signal replica.
- g i the replica of the stego signal is substantially the same as the replica of the cover signal.
- the replica ⁇ overscore (r) ⁇ i (t) 41 a is multiplied by the stego signal 31 a in multiplier 42 c to obtain the correlation product:
- one objective is to obtain spectra of the products r j (t)s(t) and r l (t)r j (t), i ⁇ j, with little low frequency content.
- filtering is performed on c(t) by filter 44 , which has a filter characteristic matching the spectrum of the auxiliary signal. For example, in the case of a binary data signal with a rectangular pulse shape, the matched filtering corresponds to integration over the bit interval. In the case of digital signaling, the filtering operation is followed by symbol regeneration in a regenerator 46 . A multiplicity of the extracted data symbols is then subjected to well-known error detection, error correction, and synchronization techniques to verify the existence of an actual message and proper interpretation of the content of the message.
- a replica signal 41 is obtained by shifting the frequency of the filtered cover signal 31 by a predetermined offset frequency f i as specified by the stego key 9 .
- This shifting process is also known as single sideband amplitude modulation, or frequency translation.
- a number of different techniques known in the art are available to perform this process.
- Blocks 52 and 54 represent respective phase shifts of the input signal s(t). To achieve the desired frequency shift, the relationship between the phase shifts must be defined as:
- the respective phase-shifted signals are multiplied by sinusoidal signals with frequency f l , in respective multipliers 56 a and 56 b .
- Block 58 denotes a 90° phase shift of the sinusoidal signal applied to multiplier 56 b .
- the resulting signals are then combined in summer 59 .
- the replica signal 41 can be expressed as:
- r i ( t ) s ( t, ⁇ 1 )sin(2 ⁇ f i t ) ⁇ s ( t, ⁇ 2 )cos(2 ⁇ f i t ) (7)
- the Hilbert transform may be performed in software by various known algorithms, with equation (8) being suitable for digital signal processing. For analog signal processing, it is easier to design a circuit pair that maintains the 90° relative phase shifts throughout the signal spectrum, than to perform a Hilbert transform.
- the particular frequency offset f i can be chosen from a wide range of frequencies, and specified by the stego key.
- Multiple auxiliary signals can be inserted into the same time, frequency and/or space domain of the same cover signal, by having a different frequency offset value, to thus achieve a “layering” of auxiliary signals and increase auxiliary channel throughput.
- the frequency offset also may be varied in time according to a predefined secret pattern (known as “frequency hopping”), to improve the security of a digital watermark represented by the auxiliary information.
- frequency hopping a predefined secret pattern
- frequency offset values are dependent upon the conditions and parameters of the particular application, and can be further fine tuned by trial and error. According to experimental results, optimal signal robustness in the presence of channel distortion was achieved where the frequency offset value was larger than the majority of spectrum frequencies of the modulating auxiliary signal m(t). On the other hand, optimal transparency was achieved where the frequency offset value was substantially smaller than the lowest frequency of the cover signal. As an example, for audio signal embedding a cover signal above 500 Hz was used with a frequency offset of 50 Hz, while the modulating signal was a binary data signal with a bit rate of 25 bps.
- the replica is generated by shifting the phase of the filtered/masked portion 31 of the cover signal by a predetermined amount defined by a function ⁇ i (f) for an i-th embedded signal.
- the replica generators 40 and 40 a are linear systems having a transfer function defined as:
- a i is a constant with respect to frequency
- j is the imaginary number ⁇ square root ⁇ square root over ( ⁇ 1) ⁇
- ⁇ i (f) is the phase characteristic of the system. Circuits described by equation (10) are known in the art as all-pass filters or phase correctors, and their design is well-known to those skilled in the art.
- This embodiment is particularly suitable for auxiliary signal embedding in audio signals, since the human audio sensory system is substantially insensitive to phase shifts.
- the functions ⁇ i (f) are defined to meet the objective that the product of the replica and the cover signal contain minimal low frequency content. This can be achieved by maintaining at least a 90° shift for all frequency components in the filtered/masked signal 31. Multiple embedded messages have been implemented with little interference where the phase shift between frequency components of different messages is larger than 90° for the majority of the spectral components. The exact choice of the function ⁇ i (f) is otherwise governed by considerations of tradeoff between cost and security.
- the function should be complex enough so that it is difficult for unauthorized persons to determine the signal structure by analyzing the stego signal, even with the known cover signal, yet it should be computationally inexpensive to implement.
- a function hopping pattern which switches between different functions at predetermined intervals as part of the stego key can be used to further enhance security.
- the replica generator obtains the replica signal by amplitude modulation of the cover signal.
- the amplitude modulation can be expressed by the equation
- FIGS. 6 ( a )- 6 ( c ) illustrate a set of three elementary functions a 1 (t), a 2 (t), and a 3 (t) used to generate amplitude shifted replica signals, with each function being defined over the interval (0, T) where T equals the bit interval of the auxiliary signal. Longer replicas are generated by using a string of elementary functions.
- the sign of A j,n depends on the sign of m j (t) during the n-th bit interval, or in other words the transmitted bit value.
- the functions used for amplitude shifting generally should have a small low frequency content, a spectrum below the lowest frequency of the filtered/masked signal, and should be mutually orthogonal. The particular choice of functions depends upon the specific application, and is specified in the stego key.
- a combination of different shifts in different domains can be executed simultaneously to generate a replica signal.
- a time shift can be combined with a frequency shift, or an amplitude shift can be combined with a phase shift.
- Such a combination shift can further improve the hiding (security) property of the embedding system, and also improve detectability of the embedded signal by increasing the difference from the cover signal.
- certain naturally occurring signals may have a content similar to a replica signal; for example, echo in an audio signal may produce a phase shifted signal, choral passages in a musical program may produce a frequency shifted signal, and tremolo may produce amplitude shifts, which may interfere with embedded signal detection.
- Use of a combination of shifts reduces the likelihood that a natural phenomenon will exactly match the parameters of the stego key, and interfere with signal detection.
Abstract
Description
- 1. Field of the Invention
- This invention relates to apparatus and methods for encoding or embedding and decoding or extracting information in analog signals, such as audio, video and data signals, either transmitted by radio wave transmission or wired transmission, or stored in a recording medium such as optical or magnetic disks, magnetic tape, or solid state memory.
- 2. Background and Description of Related Art
- The present invention is concerned with techniques for embedding and extracting auxiliary information within an existing signal, such as an audio or video signal.
- An area of particular interest to certain embodiments of the present invention relates to the market for musical recordings. Currently, a large number of people listen to musical recordings on radio or television. They often hear a recording which they like enough to purchase, but don't know the name of the song, the artist performing it, or the record, tape, or CD album of which it is part. As a result, the number of recordings which people purchase is less than it otherwise would be if there was a simple way for people to identify which of the recordings that they hear on the radio or TV they wish to purchase.
- Another area of interest to certain embodiments of the invention is copy control (also referred to as digital watermarking). There is currently a large market for audio software products, such as musical recordings. One of the problems in this market is the ease of copying such products without paying those who produce them. This problem is becoming particularly troublesome with the advent of recording techniques, such as digital audio tape (DAT), which make it possible for copies to be of very high quality. Thus it would be desirable to develop a scheme which would prevent the unauthorized copying of audio recordings, including the unauthorized copying of audio works broadcast over the airwaves. It is also desirable for copyright enforcement to be able to insert into program material such as audio or video signals digital copyright information identifying the copyright holder, which information may be detected by appropriate apparatus to identify the copyright owner of the program, while remaining imperceptible to the listener or viewer.
- Yet another field of interest relating to the present invention pertains to automatic royalty tracking and proof of performance of copyrighted material or commercial advertisements, by which copyright owners are able to track public performances or broadcasts of their material for royalty payment purposes, and advertisers are able to confirm that commercials which they have paid for were actually broadcast at the proper time and date.
- Still another area of interest to the present invention relates to integrity verification or tampering detection, wherein the creator of an audio or audiovisual work can determine whether it has been altered, modified or incorporated into another work.
- Various prior art methods of encoding additional information onto a source signal are known. For example, it is known to pulse-width modulate a signal to provide a common or encoded signal carrying at least two information portions or other useful portions. In U.S. Pat. No. 4,497,060 to Yang (1985) binary data is transmitted as a signal having two differing pulse-widths to represent logical “0” and “1” (e.g., the pulse-width durations for a “1” are twice the duration for a “0”). This correspondence also enables the determination of a clocking signal.
- With respect to systems in which audio signals produce audio transmissions, U.S. Pat. Nos. 4,876,617 to Best et al. (1989) and 5,113,437 to Best et al. (1992) disclose encoders for forming relatively thin and shallow (e.g., 150 Hz wide and 50 dB deep) notches in mid-range frequencies of an audio signal. The earlier of these patents discloses paired notch filters centered about the 2883 Hz and 3417 Hz frequencies; the later patent discloses notch filters but with randomly varying frequency pairs to discourage erasure or inhibit filtering of the information added to the notches. The encoders then add digital information in the form of signals in the lower frequency indicating a “0” and in the higher frequency a “1”. In the later Best et al. patent an encoder samples the audio signal, delays the signal while calculating the signal level, and determines during the delay whether or not to add the data signal and, if so, at what signal level. The later Best et al. patent also notes that the “pseudo-random manner” in moving the notches makes the data signals more difficult to detect audibly.
- Other prior art techniques employ the psychoacoustic model of the human perception characteristic to insert modulated or unmodulated tones into a host signal such that they will be masked by existing signal components and thus not perceived. See e.g. Preuss et al., U.S. Pat. No. 5,319,735, and Jensen et al., U.S. Pat. No. 5,450,490. Such techniques are very expensive and complicated to implement, while suffering from a lack of robustness in the face of signal distortions imposed by perception-based compression schemes designed to eliminate masked signal components.
- The prior art fails to provide a method and an apparatus for embedding and extracting auxiliary analog or digital information signals onto analog audio or video frequency signals for producing humanly perceived transmissions (i.e., sounds or images) such that the audio or video frequency signals produce substantially identical humanly perceived transmission prior to as well as after encoding with the auxiliary signals (in other words, the embedded information is transparent to the listener or viewer), which is also robust to a high degree of signal distortions caused by noisy transmission mediums, etc. The prior art also fails to provide relatively simple and inexpensive apparatus and methods for embedding and extracting signals defining auxiliary information into audio or video frequency signals for producing humanly perceived audio transmissions.
- The present invention provides apparatus and methods for embedding or encoding, and extracting or decoding, auxiliary (analog or digital) information in an analog host or cover signal in a way which has minimal impact on the perception of the source information when the analog signal is applied to an appropriate output device, such as a speaker, a display monitor, or other electrical/electronic device.
- The present invention further provides apparatus and methods for embedding and extracting machine readable signals in an analog cover signal which control the ability of a device to copy the cover signal.
- In summary, the present invention provides for the encoding or embedding of an auxiliary signal in an analog host or cover signal, by generating a replica signal from the cover signal, modifying the replica signal as a function of the auxiliary signal, and inserting the modified replica signal back into the analog cover signal to provide a stego signal. The invention further provides for the extraction of embedded auxiliary signals from stego signals by generating a replica of the stego signal, and correlating the replica with the stego signal.
- According to another aspect of the invention, apparatus for embedding and extracting auxiliary signals in an analog cover signal, is provided, comprising a replica generator for generating a replica signal from the cover signal, a modulator for modifying the replica signal as a function of the auxiliary signal, an adder for inserting the modified replica signal back into the analog cover signal to produce a stego signal, a receiver for receiving the stego signal, a generator for generating a replica signal from the stego signal, a modulator for modifying the received stego signal as a function of the replica signal of the received stego signal, and an extractor for extracting the auxiliary signal by filtering the modified received stego signal.
- The term cover signal as used hereinafter refers to a host or source signal, such as an audio, video or other information signal, which carries or is intended to carry embedded or hidden auxiliary data.
- These and other aspects of the present invention will become more fully understood from the following detailed description of the preferred embodiments in conjunction with the accompanying drawings, in which:
- FIG. 1 is a block diagram of a data signal embedding and extracting process utilized by the present invention;
- FIG. 2 is a block diagram of one embodiment of the
embeddor 10 of FIG. 1; - FIG. 3 is a block diagram of one embodiment of the embedded
signal generator 11 of FIG. 2; - FIG. 4 is a block diagram of one embodiment of the
data signal extractor 20 according to the present invention; - FIG. 5 is a block diagram of one embodiment of a replica generator which produces a cover signal replica shifted in frequency from the original; and
- FIGS.6(a)-6(c) are graphs showing a set of orthogonal functions used in the creation of an amplitude-shifted replica according to one embodiment of the present invention.
- The present invention is directed to a method and apparatus for embedding information or data onto a cover signal, such as an audio signal, video signal, or other analog signal (hereinafter called a “cover signal”), by generating a replica of the cover signal within a predefined frequency, time and/or space domain, modulating the replica with an auxiliary signal representing the information to be added to the cover signal, and then inserting the modulated replica back into the cover signal. The invention can implemented in a number of different ways, either by software programming of a digital processor, in the form of analog, digital, or mixed-signal integrated circuits, as a discrete component electronic device, or a combination of such implementations. The replica is similar to the cover signal in time and frequency domain content, but different in certain parameters as specified by a stego key, which is not generally known, but which is known at authorized receiving apparatus.
- Referring to FIG. 1, the invention employs an
embeddor 10 to generate astego signal 4, which is substantially the same in terms of the content and quality of information carried by acover signal 2. For instance, wherecover signal 2 is a video or audio signal, thestego signal 4 will produce essentially the same video or audio program or information when applied to an output device such as a video display or loudspeaker. - A
stego key 9 is used to determine and specify the particular region of the time, frequency and/or space domain of the replica where theauxiliary signal 6 is to be embedded, as well as the parameters of the embedding process. - The embeddor then appropriately modulates or modifies the replica and adds the replica back into the cover signal to obtain a
stego signal 4.Stego signal 4 can be transmitted, or stored in a storage medium such as magnetic tape, CD-ROM, solid state memory, and the like for later recall and/or transmission. The embedded auxiliary signal is recovered by anextractor 20, having knowledge of or access to thestego key 9, which operates on thestego signal 4 to extract theauxiliary signal 6. The embedding process can be expressed by the formula: - where {overscore (s)}(t) represents the
stego signal 4, s(t) represents thecover signal 2, and wi(t) is the i-th hidden signal 8 (see FIG. 2), also known as a watermark. In this regard, the embeddor can be used to insert multipleauxiliary signals 6 simultaneously, using adifferent stego key 9 for each signal. In the case where only a singleauxiliary signal 6 is to be inserted, asingle stego key 9 is used, and there would be only one hidden signal w(t). In equation (1) and hereinafter, a one-dimensional signal (i.e. a signal varying according to a single dimension, such as time) is considered for purposes of simplicity in explanation; however, the present invention is not limited to one-dimensional signals but can be readily extended to multidimensional signals such as images (two dimensions), video (three dimensions), etc., by defining t as a vector. - According to the present invention, a replica of the
cover signal 2 itself is used as a carrier for theauxiliary signal 6. Because the replica is inherently similar to the cover signal in terms of frequency content, no analysis of the cover signal is necessary in order to hide an auxiliary signal, such as a digital watermark. - In contrast, according to the prior art techniques discussed above, auxiliary signals are embedded in the form of a pseudorandom sequence (Preuss et al.) or in the form of multiple tones distributed over the frequency band of the cover signal (Jensen et al.). In order to “hide” such signals so that they are perceptively transparent, it was necessary to perform an analysis of the cover signal in the frequency domain to make the watermark signal imperceptible to the observer. Such analysis is based on the phenomenon that human perception will not detect a smaller signal in the presence of a larger signal if the two signals are sufficiently similar. This phenomenon is usually known as the masking effect.
- The embedded
signal 8 according to the present invention can be expressed by the formula: - W i(t)=g i m i(t)r i(t) (2)
- where gi<1 is a gain (scaling factor) parameter determined by tradeoff considerations of robustness versus transparency, ml(t) is the
auxiliary signal 6, wherein |mi(t)|≦1, and ri(t) is a replica of thecover signal 2. The gain factor gi can be a predetermined constant for a given application, or it can be adaptable, such that dynamic changes in transparency and robustness conditions can be taken into account. For example, in highly tonal musical passages the gains can be lower, while for spectrally rich or noisy audio signals the gains can be higher, with equivalent levels of transparency. In an alternate embodiment, the embeddor can perform an extractor process simulation to identify signals having less than desirable detectability, and increase the gain accordingly. - FIG. 2 shows a block diagram of one preferred embodiment of the
embeddor 10. As shown, thecover signal 2,stego key 9, andauxiliary signal 6 are inputted to an embeddedsignal generator 11. The embedded signal generator generates replica ri(t) fromcover signal 2 according to thestego key 9, modulates or modifies the replica ri(t) with auxiliary signal 6 (ml(t)), scales the result using gain parameter g1, and generates an embedded signal 8 (wi(t)). The embeddedsignal 8 is then added to the cover signal 2 (s(t)) in anadder 12, to produce the stego signal 4 ({overscore (s)}(t)). - The replica ri(t) is obtained by taking a portion of the
cover signal 2 within a specified time, frequency and/or spatial domain as specified by thestego key 9, and then making slight modifications to the signal portion, also as specified by thestego key 9. The modifications to the signal portion need to be small to ensure that the replica remains similar to the cover signal as judged by the human psychoacoustic-psychovisual systems, but such modifications must be large enough to be detectable by an appropriately designed extractor having knowledge of or access to thestego key 9. As will be discussed below, a number of different types of modifications have been found to satisfy these requirements. - Equation (2) reveals that the replica ri(t) is modulated by the auxiliary signal mi(t) according to a process known as product modulation. Product modulation results in a broadening of the spectrum of the embedded signal proportionally to the spectral width of the auxiliary signal. In order to make the spectrum of the embedded signal similar to the spectrum of the cover signal (to preserve the transparency of the embedding process) the spectrum of the auxiliary signal must be narrow in comparison with the lowest frequency in the spectrum of the replica. This requirement imposes a limit on the capacity of the auxiliary channel, and dictates that low frequency components of the cover signal are unsuitable for inclusion in the creation of the replica.
-
- where N is the number of binary digits or bits in the message, bn∈(−1, 1) is the n-th bit value, T is the bit interval, and h(t) represents the shape of the pulse representing the bit. Typically, h(t) is obtained by low-pass filtering a rectangular pulse so as to restrict the spectral width of the modulating (auxiliary) signal.
- FIG. 3 illustrates the details of an embedded
signal generator 11 used to generate a single embedded data message. Thecover signal 2 is filtered and/or masked in filtering/maskingblock 30 to produce a filtered/masked signal 31. The filter/mask block 30 separates regions of the cover signal used for different embedded messages. For example, the filter/mask block may separate the frequency band region 1000-3000 Hz from the cover signal in the frequency domain, may separate the time interval region t=10 seconds to t=30 seconds from the cover signal in the time domain, or may separate the upper right spatial quadrant region of the cover signal in the spatial domain (such as where the cover signal is an MPEG, JPEG or equivalent signal) which separated region would then be used for auxiliary signal embedding. - The filtered/
masked signal 31 is comprised of the selected regions of the cover signal, as specified by stegokey 9, which are then used for creation of thereplica signal 41. Thesignal 31 is then inputted to areplica creator 40, where predetermined parameters of the signal are modified, as specified by stegokey 9, to create the replica ri(t) 41. Thereplica 41 is then modulated by the auxiliary signal mi(t) inmultiplier 42 a, and the resultant signal is then scaled in multiplier 42 b according to the selected gain factor gi to produce embedded signal component 8 (i.e., wi(t) in equation (2)). The embeddedsignal component 8 is then added back to thecover signal 2 in adder 12 (FIG. 2) to obtain thestego signal 4. In order to maintain synchronization between thecover signal 2 and the embeddedsignal component 8, inherent processing delays present in the filter/mask block 30 andreplica creator block 40 are compensated for by adding equivalent an delay in the cover signal circuit path (between the cover signal input and the adder 12) shown in FIG. 2. - It is further possible to embed multiple auxiliary data signals in the
cover signal 2, by using multiple embedded signal generators, each using a different stego key to modify a different feature of the cover signal and/or to use different regions of the cover signal, so as to produce multiple embedded signal components each of which are added to thecover signal 2. Alternatively, the different data signals may be embedded in a cascade fashion, with the output of one embeddor becoming the input of another embeddor using a different stego key. In either alternative interference between embedded signal components must be minimized. This can be accomplished by using non-overlapping frequency, time or space regions of the signal, or by selecting appropriate replica creation parameters, as disclosed below. - A block diagram of an extractor used to recover the auxiliary data embedded in the stego signal is shown in FIG. 4. The
stego signal 4 is filtered/masked in filter/mask module 30 a to isolate the regions where the auxiliary data is embedded. The filtered signal 31 a is inputted toreplica creator 40 a where a replica {overscore (r)}i(t) 41 a of the stego signal is generated in the same manner as the replica rl(t) of the cover signal in thereplica creator block 40 in the embeddor, using thesame stego key 9. The replica {overscore (r)}i(t) of thestego signal 4 can be expressed by the formula: - where R(mi(t)rl(t)) represents the replica of the modulated cover signal replica. For sufficiently small gain factors gi the replica of the stego signal is substantially the same as the replica of the cover signal.
- In the
extractor 20, the replica {overscore (r)}i(t) 41 a is multiplied by the stego signal 31 a in multiplier 42 c to obtain the correlation product: - c(t)={overscore (r)}i(t){overscore (s)}(t)≈r j(t)s(t)+Σg i m i(t)r i(t)r j(t) (5)
- In designing the replica signal, one objective is to obtain spectra of the products rj(t)s(t) and rl(t)rj(t), i≠j, with little low frequency content. On the other hand, the spectra of the product rj(t)rj(t)=rj 2(t) contains a strong DC component, and thus the correlation product c(t) contains a term of the form giml(t) mean (rj 2), i.e., c(t) contains the scaled auxiliary signal mi(t) as a summation term.
- In order to extract the auxiliary signal mi(t) from the correlation product c(t), filtering is performed on c(t) by filter 44, which has a filter characteristic matching the spectrum of the auxiliary signal. For example, in the case of a binary data signal with a rectangular pulse shape, the matched filtering corresponds to integration over the bit interval. In the case of digital signaling, the filtering operation is followed by symbol regeneration in a regenerator 46. A multiplicity of the extracted data symbols is then subjected to well-known error detection, error correction, and synchronization techniques to verify the existence of an actual message and proper interpretation of the content of the message.
- One preferred embodiment of a
replica creator 40 is shown in FIG. 5. In this embodiment, areplica signal 41 is obtained by shifting the frequency of the filteredcover signal 31 by a predetermined offset frequency fi as specified by thestego key 9. This shifting process is also known as single sideband amplitude modulation, or frequency translation. In addition to the processing shown in FIG. 5, a number of different techniques known in the art are available to perform this process. -
Blocks - ∠1(f)−φ2(f)=90° (6)
- The respective phase-shifted signals are multiplied by sinusoidal signals with frequency fl, in
respective multipliers 56 a and 56 b.Block 58 denotes a 90° phase shift of the sinusoidal signal applied to multiplier 56 b. The resulting signals are then combined insummer 59. Thus, thereplica signal 41 can be expressed as: - r i(t)=s(t,φ 1)sin(2πf i t)±s(t,φ 2)cos(2πf i t) (7)
- where s(t,φi) denotes signal s(t) phase-shifted by φi. The sign − or + in the summation process represents a respective shift up or down by fl. According to psychoacoustic models published in the literature, better masking may be achieved when the shift is upward. Accordingly, in the preferred embodiment subtraction is used in equation (7). In a special case φ1=90° and φ2=0°, such that equation (7) becomes:
- r i(t)=s h(t)sin(2πf i t)±s(t)cos(2πf i t) (8)
-
- The Hilbert transform may be performed in software by various known algorithms, with equation (8) being suitable for digital signal processing. For analog signal processing, it is easier to design a circuit pair that maintains the 90° relative phase shifts throughout the signal spectrum, than to perform a Hilbert transform.
- The particular frequency offset fi can be chosen from a wide range of frequencies, and specified by the stego key. Multiple auxiliary signals can be inserted into the same time, frequency and/or space domain of the same cover signal, by having a different frequency offset value, to thus achieve a “layering” of auxiliary signals and increase auxiliary channel throughput.
- The frequency offset also may be varied in time according to a predefined secret pattern (known as “frequency hopping”), to improve the security of a digital watermark represented by the auxiliary information.
- The particular choice of frequency offset values is dependent upon the conditions and parameters of the particular application, and can be further fine tuned by trial and error. According to experimental results, optimal signal robustness in the presence of channel distortion was achieved where the frequency offset value was larger than the majority of spectrum frequencies of the modulating auxiliary signal m(t). On the other hand, optimal transparency was achieved where the frequency offset value was substantially smaller than the lowest frequency of the cover signal. As an example, for audio signal embedding a cover signal above 500 Hz was used with a frequency offset of 50 Hz, while the modulating signal was a binary data signal with a bit rate of 25 bps.
- In an alternative embodiment of a replica creator, the replica is generated by shifting the phase of the filtered/masked
portion 31 of the cover signal by a predetermined amount defined by a function φi(f) for an i-th embedded signal. In this case, thereplica generators - H i(f)=A i e jφ i (f) (10)
- Where Ai is a constant with respect to frequency, j is the imaginary number {square root}{square root over (−1)} and φi(f) is the phase characteristic of the system. Circuits described by equation (10) are known in the art as all-pass filters or phase correctors, and their design is well-known to those skilled in the art.
- This embodiment is particularly suitable for auxiliary signal embedding in audio signals, since the human audio sensory system is substantially insensitive to phase shifts. The functions φi(f) are defined to meet the objective that the product of the replica and the cover signal contain minimal low frequency content. This can be achieved by maintaining at least a 90° shift for all frequency components in the filtered/
masked signal 31. Multiple embedded messages have been implemented with little interference where the phase shift between frequency components of different messages is larger than 90° for the majority of the spectral components. The exact choice of the function φi(f) is otherwise governed by considerations of tradeoff between cost and security. In other words, the function should be complex enough so that it is difficult for unauthorized persons to determine the signal structure by analyzing the stego signal, even with the known cover signal, yet it should be computationally inexpensive to implement. A function hopping pattern which switches between different functions at predetermined intervals as part of the stego key can be used to further enhance security. - A special class of phase shift functions, defined by
- φi(f)=τ i f (11)
- where τi is a constant, results in time shift replicas of the cover signal. This class of functions has special properties in terms of cost/security tradeoff, which are beyond the scope of the present disclosure and will not be further treated here.
- According to a further alternate embodiment of the invention, the replica generator obtains the replica signal by amplitude modulation of the cover signal. The amplitude modulation can be expressed by the equation
- r i(t)=a i(t)s(t) (12)
-
-
- for i≠j, and aj 2(t)=1
- As is apparent from equation (13), the sign of Aj,n (and the received bit value) depends on the sign of mj(t) during the n-th bit interval, or in other words the transmitted bit value. The functions used for amplitude shifting generally should have a small low frequency content, a spectrum below the lowest frequency of the filtered/masked signal, and should be mutually orthogonal. The particular choice of functions depends upon the specific application, and is specified in the stego key.
- According to yet another alternative embodiment, a combination of different shifts in different domains can be executed simultaneously to generate a replica signal. For example, a time shift can be combined with a frequency shift, or an amplitude shift can be combined with a phase shift. Such a combination shift can further improve the hiding (security) property of the embedding system, and also improve detectability of the embedded signal by increasing the difference from the cover signal.
- With respect to security, attacks would be expected that incorporate analysis designed to reveal the parameters of the stego key. If such parameters become known, then the embedded signal can be overwritten or obliterated by use of the same stego key. Use of a combination of shifts makes such analysis more difficult by enlarging the parameter space.
- With respect to detectability, certain naturally occurring signals may have a content similar to a replica signal; for example, echo in an audio signal may produce a phase shifted signal, choral passages in a musical program may produce a frequency shifted signal, and tremolo may produce amplitude shifts, which may interfere with embedded signal detection. Use of a combination of shifts reduces the likelihood that a natural phenomenon will exactly match the parameters of the stego key, and interfere with signal detection.
- The invention having been thus described, it will be apparent to those skilled in the art that the same may be varied in many ways without departing from the spirit and scope of the invention. Any and all such modifications as would be apparent to those skilled in the art are intended to be covered by the following claims.
Claims (30)
Priority Applications (14)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/106,213 US6427012B1 (en) | 1997-05-19 | 1998-06-29 | Apparatus and method for embedding and extracting information in analog signals using replica modulation |
AT99930276T ATE386322T1 (en) | 1998-06-29 | 1999-06-16 | APPARATUS AND METHOD FOR EMBEDING AND EXTRACTING INFORMATION IN ANALOG SIGNALS USING REPLICATION MODULATION |
EP99930276A EP1095376B1 (en) | 1998-06-29 | 1999-06-16 | Apparatus and method for embedding and extracting information in analog signals using replica modulation |
ES99930276T ES2297927T3 (en) | 1998-06-29 | 1999-06-16 | APPARATUS AND METHOD FOR THE INSERTION AND EXTRACTION OF INFORMATION IN ANALOG SIGNALS THROUGH MODULATION OF REPLIES. |
PCT/US1999/013482 WO2000000969A1 (en) | 1998-06-29 | 1999-06-16 | Apparatus and method for embedding and extracting information in analog signals using replica modulation |
CA002335975A CA2335975A1 (en) | 1998-06-29 | 1999-06-16 | Apparatus and method for embedding and extracting information in analog signals using replica modulation |
JP2000557464A JP4217381B2 (en) | 1998-06-29 | 1999-06-16 | Apparatus and method for incorporating information into analog signal using replica modulation |
KR1020007015075A KR20010053329A (en) | 1998-06-29 | 1999-06-16 | Apparatus and method for embedding and extracting information in analog signals using replica modulation |
DE69938135T DE69938135T2 (en) | 1998-06-29 | 1999-06-16 | DEVICE AND METHOD FOR EMBEDDING AND EXTRACTING INFORMATION IN ANALOGUE SIGNALS BY USING REPLICATION MODULATION |
US10/206,826 US6683958B2 (en) | 1997-05-19 | 2002-07-29 | Apparatus and method for embedding and extracting information in analog signals using distributed signal features and replica modulation |
US10/763,288 US7606366B2 (en) | 1997-05-19 | 2004-01-26 | Apparatus and method for embedding and extracting information in analog signals using distributed signal features and replica modulation |
US12/426,158 US8085935B2 (en) | 1997-05-19 | 2009-04-17 | Embedding and extraction of information from an embedded content using replica modulation |
US13/315,595 US8474059B2 (en) | 1997-05-19 | 2011-12-09 | Apparatus and method for embedding and extracting information in analog signals using distributed signal features and replica modulation |
US13/925,676 US20130283402A1 (en) | 1997-05-19 | 2013-06-24 | Apparatus and method for embedding and extracting information in analog signals using distributed signal features and replica modulation |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/858,562 US5940135A (en) | 1997-05-19 | 1997-05-19 | Apparatus and method for encoding and decoding information in analog signals |
US08/974,920 US6175627B1 (en) | 1997-05-19 | 1997-11-20 | Apparatus and method for embedding and extracting information in analog signals using distributed signal features |
US09/106,213 US6427012B1 (en) | 1997-05-19 | 1998-06-29 | Apparatus and method for embedding and extracting information in analog signals using replica modulation |
Related Parent Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/858,562 Continuation-In-Part US5940135A (en) | 1997-05-19 | 1997-05-19 | Apparatus and method for encoding and decoding information in analog signals |
US08/974,920 Continuation-In-Part US6175627B1 (en) | 1997-05-19 | 1997-11-20 | Apparatus and method for embedding and extracting information in analog signals using distributed signal features |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/206,826 Continuation US6683958B2 (en) | 1997-05-19 | 2002-07-29 | Apparatus and method for embedding and extracting information in analog signals using distributed signal features and replica modulation |
Publications (2)
Publication Number | Publication Date |
---|---|
US20020097873A1 true US20020097873A1 (en) | 2002-07-25 |
US6427012B1 US6427012B1 (en) | 2002-07-30 |
Family
ID=22310153
Family Applications (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/106,213 Expired - Lifetime US6427012B1 (en) | 1997-05-19 | 1998-06-29 | Apparatus and method for embedding and extracting information in analog signals using replica modulation |
US10/206,826 Expired - Fee Related US6683958B2 (en) | 1997-05-19 | 2002-07-29 | Apparatus and method for embedding and extracting information in analog signals using distributed signal features and replica modulation |
US10/763,288 Expired - Fee Related US7606366B2 (en) | 1997-05-19 | 2004-01-26 | Apparatus and method for embedding and extracting information in analog signals using distributed signal features and replica modulation |
US12/426,158 Expired - Fee Related US8085935B2 (en) | 1997-05-19 | 2009-04-17 | Embedding and extraction of information from an embedded content using replica modulation |
US13/315,595 Expired - Fee Related US8474059B2 (en) | 1997-05-19 | 2011-12-09 | Apparatus and method for embedding and extracting information in analog signals using distributed signal features and replica modulation |
US13/925,676 Abandoned US20130283402A1 (en) | 1997-05-19 | 2013-06-24 | Apparatus and method for embedding and extracting information in analog signals using distributed signal features and replica modulation |
Family Applications After (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/206,826 Expired - Fee Related US6683958B2 (en) | 1997-05-19 | 2002-07-29 | Apparatus and method for embedding and extracting information in analog signals using distributed signal features and replica modulation |
US10/763,288 Expired - Fee Related US7606366B2 (en) | 1997-05-19 | 2004-01-26 | Apparatus and method for embedding and extracting information in analog signals using distributed signal features and replica modulation |
US12/426,158 Expired - Fee Related US8085935B2 (en) | 1997-05-19 | 2009-04-17 | Embedding and extraction of information from an embedded content using replica modulation |
US13/315,595 Expired - Fee Related US8474059B2 (en) | 1997-05-19 | 2011-12-09 | Apparatus and method for embedding and extracting information in analog signals using distributed signal features and replica modulation |
US13/925,676 Abandoned US20130283402A1 (en) | 1997-05-19 | 2013-06-24 | Apparatus and method for embedding and extracting information in analog signals using distributed signal features and replica modulation |
Country Status (9)
Country | Link |
---|---|
US (6) | US6427012B1 (en) |
EP (1) | EP1095376B1 (en) |
JP (1) | JP4217381B2 (en) |
KR (1) | KR20010053329A (en) |
AT (1) | ATE386322T1 (en) |
CA (1) | CA2335975A1 (en) |
DE (1) | DE69938135T2 (en) |
ES (1) | ES2297927T3 (en) |
WO (1) | WO2000000969A1 (en) |
Cited By (59)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010036292A1 (en) * | 2000-03-18 | 2001-11-01 | Levy Kenneth L. | Feature-based watermarks and watermark detection strategies |
US20030014634A1 (en) * | 2001-04-06 | 2003-01-16 | Verance Corporation | Methods and apparatus for embedding and recovering watermarking information based on host-matching codes |
US20030012401A1 (en) * | 2001-04-25 | 2003-01-16 | Sharma Ravi K. | Encoded reference signal for digital watermarks |
US20030103645A1 (en) * | 1995-05-08 | 2003-06-05 | Levy Kenneth L. | Integrating digital watermarks in multimedia content |
US20030185417A1 (en) * | 2002-01-22 | 2003-10-02 | Alattar Adnan M. | Digital watermarking and fingerprinting including synchronization, layering, version control, and compressed embedding |
US6744906B2 (en) | 1995-05-08 | 2004-06-01 | Digimarc Corporation | Methods and systems using multiple watermarks |
US6763123B2 (en) | 1995-05-08 | 2004-07-13 | Digimarc Corporation | Detection of out-of-phase low visibility watermarks |
US6804376B2 (en) | 1998-01-20 | 2004-10-12 | Digimarc Corporation | Equipment employing watermark-based authentication function |
US20050147248A1 (en) * | 2002-03-28 | 2005-07-07 | Koninklijke Philips Electronics N.V. | Window shaping functions for watermarking of multimedia signals |
US20060008112A1 (en) * | 2000-04-19 | 2006-01-12 | Reed Alastair M | Low visible digital watermarks |
US20060188128A1 (en) * | 1993-11-18 | 2006-08-24 | Rhoads Geoffrey B | Method and System for Managing and Controlling Electronic Media |
US20070047763A1 (en) * | 2000-03-10 | 2007-03-01 | Levy Kenneth L | Associating First and Second Watermarks with Audio or Video Content |
US20080022114A1 (en) * | 1996-07-02 | 2008-01-24 | Wistaria Trading, Inc. | Optimization methods for the insertion, protection, and detection of digital watermarks in digital data |
US7660700B2 (en) | 2000-09-07 | 2010-02-09 | Blue Spike, Inc. | Method and device for monitoring and analyzing signals |
US7660982B1 (en) * | 2003-02-27 | 2010-02-09 | Weinblatt Lee S | Subscription broadcast security system |
US7664263B2 (en) | 1998-03-24 | 2010-02-16 | Moskowitz Scott A | Method for combining transfer functions with predetermined key creation |
US7664264B2 (en) | 1999-03-24 | 2010-02-16 | Blue Spike, Inc. | Utilizing data reduction in steganographic and cryptographic systems |
US7728048B2 (en) | 2002-12-20 | 2010-06-01 | L-1 Secure Credentialing, Inc. | Increasing thermal conductivity of host polymer used with laser engraving methods and compositions |
US7730317B2 (en) | 1996-12-20 | 2010-06-01 | Wistaria Trading, Inc. | Linear predictive coding implementation of digital watermarks |
US7738659B2 (en) | 1998-04-02 | 2010-06-15 | Moskowitz Scott A | Multiple transform utilization and application for secure digital watermarking |
US20100150434A1 (en) * | 2008-12-17 | 2010-06-17 | Reed Alastair M | Out of Phase Digital Watermarking in Two Chrominance Directions |
US7761712B2 (en) | 1995-06-07 | 2010-07-20 | Wistaria Trading, Inc. | Steganographic method and device |
US7770017B2 (en) | 1996-07-02 | 2010-08-03 | Wistaria Trading, Inc. | Method and system for digital watermarking |
US7789311B2 (en) | 2003-04-16 | 2010-09-07 | L-1 Secure Credentialing, Inc. | Three dimensional data storage |
US7813506B2 (en) | 1999-12-07 | 2010-10-12 | Blue Spike, Inc | System and methods for permitting open access to data objects and for securing data within the data objects |
US7844074B2 (en) | 1996-07-02 | 2010-11-30 | Wistaria Trading, Inc. | Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data |
US7886151B2 (en) | 2002-01-22 | 2011-02-08 | Purdue Research Foundation | Temporal synchronization of video and audio signals |
US7987371B2 (en) | 1996-07-02 | 2011-07-26 | Wistaria Trading, Inc. | Optimization methods for the insertion, protection, and detection of digital watermarks in digital data |
US8027509B2 (en) | 2000-04-19 | 2011-09-27 | Digimarc Corporation | Digital watermarking in data representing color channels |
US8073193B2 (en) | 1994-10-21 | 2011-12-06 | Digimarc Corporation | Methods and systems for steganographic processing |
US8104079B2 (en) | 2002-04-17 | 2012-01-24 | Moskowitz Scott A | Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth |
US8171561B2 (en) | 1999-08-04 | 2012-05-01 | Blue Spike, Inc. | Secure personal content server |
US8199969B2 (en) | 2008-12-17 | 2012-06-12 | Digimarc Corporation | Out of phase digital watermarking in two chrominance directions |
US8259938B2 (en) | 2008-06-24 | 2012-09-04 | Verance Corporation | Efficient and secure forensic marking in compressed |
US8271795B2 (en) | 2000-09-20 | 2012-09-18 | Blue Spike, Inc. | Security based on subliminal and supraliminal channels for data objects |
US8340348B2 (en) | 2005-04-26 | 2012-12-25 | Verance Corporation | Methods and apparatus for thwarting watermark detection circumvention |
US8451086B2 (en) | 2000-02-16 | 2013-05-28 | Verance Corporation | Remote control signaling using audio watermarks |
US8533481B2 (en) | 2011-11-03 | 2013-09-10 | Verance Corporation | Extraction of embedded watermarks from a host content based on extrapolation techniques |
US8538011B2 (en) | 1999-12-07 | 2013-09-17 | Blue Spike, Inc. | Systems, methods and devices for trusted transactions |
US8549307B2 (en) | 2005-07-01 | 2013-10-01 | Verance Corporation | Forensic marking using a common customization function |
US8615104B2 (en) | 2011-11-03 | 2013-12-24 | Verance Corporation | Watermark extraction based on tentative watermarks |
US8682026B2 (en) | 2011-11-03 | 2014-03-25 | Verance Corporation | Efficient extraction of embedded watermarks in the presence of host content distortions |
US8726304B2 (en) | 2012-09-13 | 2014-05-13 | Verance Corporation | Time varying evaluation of multimedia content |
US8745404B2 (en) | 1998-05-28 | 2014-06-03 | Verance Corporation | Pre-processed information embedding system |
US8745403B2 (en) | 2011-11-23 | 2014-06-03 | Verance Corporation | Enhanced content management based on watermark extraction records |
US8781967B2 (en) | 2005-07-07 | 2014-07-15 | Verance Corporation | Watermarking in an encrypted domain |
US8806517B2 (en) | 2002-10-15 | 2014-08-12 | Verance Corporation | Media monitoring, management and information system |
US8838977B2 (en) | 2010-09-16 | 2014-09-16 | Verance Corporation | Watermark extraction and content screening in a networked environment |
US8869222B2 (en) | 2012-09-13 | 2014-10-21 | Verance Corporation | Second screen content |
US8923548B2 (en) | 2011-11-03 | 2014-12-30 | Verance Corporation | Extraction of embedded watermarks from a host content using a plurality of tentative watermarks |
US9099080B2 (en) | 2013-02-06 | 2015-08-04 | Muzak Llc | System for targeting location-based communications |
US9106964B2 (en) | 2012-09-13 | 2015-08-11 | Verance Corporation | Enhanced content distribution using advertisements |
US9208334B2 (en) | 2013-10-25 | 2015-12-08 | Verance Corporation | Content management using multiple abstraction layers |
US9251549B2 (en) | 2013-07-23 | 2016-02-02 | Verance Corporation | Watermark extractor enhancements based on payload ranking |
US9262794B2 (en) | 2013-03-14 | 2016-02-16 | Verance Corporation | Transactional video marking system |
US9323902B2 (en) | 2011-12-13 | 2016-04-26 | Verance Corporation | Conditional access using embedded watermarks |
US9547753B2 (en) | 2011-12-13 | 2017-01-17 | Verance Corporation | Coordinated watermarking |
US9571606B2 (en) | 2012-08-31 | 2017-02-14 | Verance Corporation | Social media viewing system |
US9596521B2 (en) | 2014-03-13 | 2017-03-14 | Verance Corporation | Interactive content acquisition using embedded codes |
Families Citing this family (83)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5748763A (en) | 1993-11-18 | 1998-05-05 | Digimarc Corporation | Image steganography system featuring perceptually adaptive and globally scalable signal embedding |
US20020136429A1 (en) * | 1994-03-17 | 2002-09-26 | John Stach | Data hiding through arrangement of objects |
US6590996B1 (en) * | 2000-02-14 | 2003-07-08 | Digimarc Corporation | Color adaptive watermarking |
US7054462B2 (en) | 1995-05-08 | 2006-05-30 | Digimarc Corporation | Inferring object status based on detected watermark data |
US20030056103A1 (en) | 2000-12-18 | 2003-03-20 | Levy Kenneth L. | Audio/video commerce application architectural framework |
US8306811B2 (en) * | 1996-08-30 | 2012-11-06 | Digimarc Corporation | Embedding data in audio and detecting embedded data in audio |
US8131007B2 (en) * | 1996-08-30 | 2012-03-06 | Regents Of The University Of Minnesota | Watermarking using multiple watermarks and keys, including keys dependent on the host signal |
US6427012B1 (en) * | 1997-05-19 | 2002-07-30 | Verance Corporation | Apparatus and method for embedding and extracting information in analog signals using replica modulation |
US6971011B1 (en) * | 1998-03-04 | 2005-11-29 | Koninklijke Philips Electronics N.V. | Watermark detection |
US7006555B1 (en) | 1998-07-16 | 2006-02-28 | Nielsen Media Research, Inc. | Spectral audio encoding |
US6442283B1 (en) | 1999-01-11 | 2002-08-27 | Digimarc Corporation | Multimedia data embedding |
DE50013479D1 (en) * | 1999-12-22 | 2006-10-26 | Deutsche Telekom Ag | METHOD AND CIRCUIT ARRANGEMENT FOR SAFE DIGITAL TRANSMISSION |
US8091025B2 (en) | 2000-03-24 | 2012-01-03 | Digimarc Corporation | Systems and methods for processing content objects |
US9609278B2 (en) | 2000-04-07 | 2017-03-28 | Koplar Interactive Systems International, Llc | Method and system for auxiliary data detection and delivery |
US6891959B2 (en) * | 2000-04-19 | 2005-05-10 | Digimarc Corporation | Hiding information out-of-phase in color channels |
US7305104B2 (en) | 2000-04-21 | 2007-12-04 | Digimarc Corporation | Authentication of identification documents using digital watermarks |
US6879652B1 (en) * | 2000-07-14 | 2005-04-12 | Nielsen Media Research, Inc. | Method for encoding an input signal |
US6674876B1 (en) * | 2000-09-14 | 2004-01-06 | Digimarc Corporation | Watermarking in the time-frequency domain |
US7376242B2 (en) | 2001-03-22 | 2008-05-20 | Digimarc Corporation | Quantization-based data embedding in mapped data |
US8050452B2 (en) | 2001-03-22 | 2011-11-01 | Digimarc Corporation | Quantization-based data embedding in mapped data |
DE60114561T2 (en) * | 2001-04-03 | 2006-08-10 | Mitsubishi Denki K.K. | Method and device for detecting a target signal and obstacle detection system |
JP4649053B2 (en) * | 2001-04-23 | 2011-03-09 | 株式会社ビデオリサーチ | Copyrighted content monitoring system and copyrighted content monitoring program |
JP3576993B2 (en) * | 2001-04-24 | 2004-10-13 | 株式会社東芝 | Digital watermark embedding method and apparatus |
US6650762B2 (en) * | 2001-05-31 | 2003-11-18 | Southern Methodist University | Types-based, lossy data embedding |
EP1267568A1 (en) * | 2001-06-11 | 2002-12-18 | STMicroelectronics Limited | A method and circuitry for processing data |
JP2003044067A (en) * | 2001-08-03 | 2003-02-14 | Univ Tohoku | Device for embedding/detecting digital data by cyclic deviation of phase |
US7392392B2 (en) | 2001-12-13 | 2008-06-24 | Digimarc Corporation | Forensic digital watermarking with variable orientation and protocols |
US7392394B2 (en) * | 2001-12-13 | 2008-06-24 | Digimarc Corporation | Digital watermarking with variable orientation and protocols |
US7006662B2 (en) * | 2001-12-13 | 2006-02-28 | Digimarc Corporation | Reversible watermarking using expansion, rate control and iterative embedding |
US7321667B2 (en) * | 2002-01-18 | 2008-01-22 | Digimarc Corporation | Data hiding through arrangement of objects |
US7181159B2 (en) * | 2002-03-07 | 2007-02-20 | Breen Julian H | Method and apparatus for monitoring audio listening |
ATE393446T1 (en) | 2002-03-28 | 2008-05-15 | Koninkl Philips Electronics Nv | MARKING TIME RANGES WITH WATERMARKS FOR MULTIMEDIA SIGNALS |
JP3754403B2 (en) | 2002-07-26 | 2006-03-15 | 株式会社東芝 | Digital watermark detection method and apparatus |
US7206409B2 (en) * | 2002-09-27 | 2007-04-17 | Technicolor, Inc. | Motion picture anti-piracy coding |
US7333611B1 (en) | 2002-09-27 | 2008-02-19 | Northwestern University | Ultra-secure, ultra-efficient cryptographic system |
US7289961B2 (en) * | 2003-06-19 | 2007-10-30 | University Of Rochester | Data hiding via phase manipulation of audio signals |
US7330511B2 (en) | 2003-08-18 | 2008-02-12 | Koplar Interactive Systems International, L.L.C. | Method and system for embedding device positional data in video signals |
US20050141716A1 (en) * | 2003-09-29 | 2005-06-30 | Prem Kumar | Coherent-states based quantum data-encryption through optically-amplified WDM communication networks |
US7616776B2 (en) | 2005-04-26 | 2009-11-10 | Verance Corproation | Methods and apparatus for enhancing the robustness of watermark extraction from digital host content |
US9055239B2 (en) | 2003-10-08 | 2015-06-09 | Verance Corporation | Signal continuity assessment using embedded watermarks |
US7369677B2 (en) * | 2005-04-26 | 2008-05-06 | Verance Corporation | System reactions to the detection of embedded watermarks in a digital host content |
EP1690364A2 (en) * | 2003-11-05 | 2006-08-16 | Northwestern University | Coherent-states based quantum data-encryption through optically-amplified wdm communication networks |
US7242775B2 (en) * | 2003-11-12 | 2007-07-10 | Magiq Technologies, Inc. | Optical pulse calibration for quantum key distribution |
US7289644B2 (en) * | 2004-04-27 | 2007-10-30 | Thomson Licensing | Anti-piracy coding of motion pictures |
JP4519678B2 (en) * | 2005-02-21 | 2010-08-04 | 株式会社東芝 | Digital watermark detection method and apparatus, digital watermark embedding method and apparatus |
JP4118279B2 (en) | 2005-03-11 | 2008-07-16 | 株式会社東芝 | Digital watermark detection apparatus and method |
TW200638335A (en) * | 2005-04-13 | 2006-11-01 | Dolby Lab Licensing Corp | Audio metadata verification |
EP1880344A4 (en) * | 2005-04-26 | 2012-12-05 | Verance Corp | Security enhancements of digital watermarks for multi-media content |
JP5194343B2 (en) * | 2005-08-08 | 2013-05-08 | 株式会社日立製作所 | Information reproducing apparatus and information reproducing method |
US20070204350A1 (en) * | 2006-02-18 | 2007-08-30 | Gibson Guitar Corp. | Secure Internet |
CA3063376C (en) | 2007-01-25 | 2022-03-29 | Arbitron Inc. | Research data gathering |
US8345871B2 (en) * | 2007-03-15 | 2013-01-01 | Palo Alto Research Center Incorporated | Fast authentication over slow channels |
US7724782B2 (en) * | 2007-03-20 | 2010-05-25 | George Mason Intellectual Properties, Inc. | Interval centroid based watermark |
US20090111584A1 (en) | 2007-10-31 | 2009-04-30 | Koplar Interactive Systems International, L.L.C. | Method and system for encoded information processing |
JP4521457B2 (en) * | 2008-11-28 | 2010-08-11 | 株式会社東芝 | Information transmission system |
US8582781B2 (en) | 2009-01-20 | 2013-11-12 | Koplar Interactive Systems International, L.L.C. | Echo modulation methods and systems |
US8715083B2 (en) | 2009-06-18 | 2014-05-06 | Koplar Interactive Systems International, L.L.C. | Methods and systems for processing gaming data |
US20110087552A1 (en) * | 2009-10-09 | 2011-04-14 | Lorenzo Carver | Method and apparatus for modifying audio or video files |
US8548810B2 (en) | 2009-11-04 | 2013-10-01 | Digimarc Corporation | Orchestrated encoding and decoding multimedia content having plural digital watermarks |
US9420336B1 (en) * | 2009-11-05 | 2016-08-16 | Cisco Technology, Inc. | Localization of customer premises equipment in a digital communication network |
US20130151855A1 (en) * | 2011-12-13 | 2013-06-13 | Verance Corporation | Watermark embedding workflow improvements |
US9087260B1 (en) * | 2012-01-03 | 2015-07-21 | Google Inc. | Hierarchical randomized quantization of multi-dimensional features |
DE102012002639B3 (en) * | 2012-02-10 | 2013-04-11 | Bundesrepublik Deutschland, vertreten durch das Bundesministerium der Verteidigung, dieses vertreten durch das Bundesamt für Ausrüstung, Informationstechnik und Nutzung der Bundeswehr | Transmission method for hidden data communication, particularly via radio communication, involves encrypting message with encryption key in initial encrypted message, where web message is encoded in frequency variation pattern with web key |
US9485089B2 (en) | 2013-06-20 | 2016-11-01 | Verance Corporation | Stego key management |
US9824694B2 (en) | 2013-12-05 | 2017-11-21 | Tls Corp. | Data carriage in encoded and pre-encoded audio bitstreams |
US8768005B1 (en) | 2013-12-05 | 2014-07-01 | The Telos Alliance | Extracting a watermark signal from an output signal of a watermarking encoder |
US8768714B1 (en) * | 2013-12-05 | 2014-07-01 | The Telos Alliance | Monitoring detectability of a watermark message |
US8918326B1 (en) | 2013-12-05 | 2014-12-23 | The Telos Alliance | Feedback and simulation regarding detectability of a watermark message |
US10504200B2 (en) | 2014-03-13 | 2019-12-10 | Verance Corporation | Metadata acquisition using embedded watermarks |
US9639911B2 (en) | 2014-08-20 | 2017-05-02 | Verance Corporation | Watermark detection using a multiplicity of predicted patterns |
US9942602B2 (en) | 2014-11-25 | 2018-04-10 | Verance Corporation | Watermark detection and metadata delivery associated with a primary content |
EP3225034A4 (en) | 2014-11-25 | 2018-05-02 | Verance Corporation | Enhanced metadata and content delivery using watermarks |
US9602891B2 (en) | 2014-12-18 | 2017-03-21 | Verance Corporation | Service signaling recovery for multimedia content using embedded watermarks |
US9130685B1 (en) | 2015-04-14 | 2015-09-08 | Tls Corp. | Optimizing parameters in deployed systems operating in delayed feedback real world environments |
US10257567B2 (en) | 2015-04-30 | 2019-04-09 | Verance Corporation | Watermark based content recognition improvements |
US9454343B1 (en) | 2015-07-20 | 2016-09-27 | Tls Corp. | Creating spectral wells for inserting watermarks in audio signals |
WO2017015399A1 (en) | 2015-07-20 | 2017-01-26 | Verance Corporation | Watermark-based data recovery for content with multiple alternative components |
US10115404B2 (en) | 2015-07-24 | 2018-10-30 | Tls Corp. | Redundancy in watermarking audio signals that have speech-like properties |
US9626977B2 (en) | 2015-07-24 | 2017-04-18 | Tls Corp. | Inserting watermarks into audio signals that have speech-like properties |
WO2017184648A1 (en) | 2016-04-18 | 2017-10-26 | Verance Corporation | System and method for signaling security and database population |
US11297398B2 (en) | 2017-06-21 | 2022-04-05 | Verance Corporation | Watermark-based metadata acquisition and processing |
US11468149B2 (en) | 2018-04-17 | 2022-10-11 | Verance Corporation | Device authentication in collaborative content screening |
US11722741B2 (en) | 2021-02-08 | 2023-08-08 | Verance Corporation | System and method for tracking content timeline in the presence of playback rate changes |
Family Cites Families (41)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5805635A (en) | 1964-03-17 | 1998-09-08 | The United States Of America As Represented By The Secretary Of The Navy | Secure communication system |
US4564862A (en) | 1982-08-09 | 1986-01-14 | Edwin Cohen | Ghost signal elimination circuit |
US4497060A (en) | 1982-12-08 | 1985-01-29 | Lockheed Electronics Co., Inc. | Self-clocking binary receiver |
GB8611014D0 (en) | 1986-05-06 | 1986-06-11 | Emi Plc Thorn | Signal identification |
US4937807A (en) | 1987-10-15 | 1990-06-26 | Personics Corporation | System for encoding sound recordings for high-density storage and high-speed transfers |
US4939515A (en) * | 1988-09-30 | 1990-07-03 | General Electric Company | Digital signal encoding and decoding apparatus |
GB8824969D0 (en) | 1988-10-25 | 1988-11-30 | Emi Plc Thorn | Identification codes |
NL8901032A (en) | 1988-11-10 | 1990-06-01 | Philips Nv | CODER FOR INCLUDING ADDITIONAL INFORMATION IN A DIGITAL AUDIO SIGNAL WITH A PREFERRED FORMAT, A DECODER FOR DERIVING THIS ADDITIONAL INFORMATION FROM THIS DIGITAL SIGNAL, AN APPARATUS FOR RECORDING A DIGITAL SIGNAL ON A CODE OF RECORD. OBTAINED A RECORD CARRIER WITH THIS DEVICE. |
US4972471A (en) | 1989-05-15 | 1990-11-20 | Gary Gross | Encoding system |
US5319453A (en) | 1989-06-22 | 1994-06-07 | Airtrax | Method and apparatus for video signal encoding, decoding and monitoring |
US5390207A (en) | 1990-11-28 | 1995-02-14 | Novatel Communications Ltd. | Pseudorandom noise ranging receiver which compensates for multipath distortion by dynamically adjusting the time delay spacing between early and late correlators |
GB2292506B (en) | 1991-09-30 | 1996-05-01 | Arbitron Company The | Method and apparatus for automatically identifying a program including a sound signal |
FR2681997A1 (en) | 1991-09-30 | 1993-04-02 | Arbitron Cy | METHOD AND DEVICE FOR AUTOMATICALLY IDENTIFYING A PROGRAM COMPRISING A SOUND SIGNAL |
US5319735A (en) | 1991-12-17 | 1994-06-07 | Bolt Beranek And Newman Inc. | Embedded signalling |
US5414729A (en) | 1992-01-24 | 1995-05-09 | Novatel Communications Ltd. | Pseudorandom noise ranging receiver which compensates for multipath distortion by making use of multiple correlator time delay spacing |
US5436653A (en) | 1992-04-30 | 1995-07-25 | The Arbitron Company | Method and system for recognition of broadcast segments |
US5379345A (en) | 1993-01-29 | 1995-01-03 | Radio Audit Systems, Inc. | Method and apparatus for the processing of encoded data in conjunction with an audio broadcast |
DE69434237T2 (en) | 1993-11-18 | 2005-12-08 | Digimarc Corp., Tualatin | Video with hidden in-band digital data |
US5450490A (en) * | 1994-03-31 | 1995-09-12 | The Arbitron Company | Apparatus and methods for including codes in audio signals and decoding |
US5404377A (en) | 1994-04-08 | 1995-04-04 | Moses; Donald W. | Simultaneous transmission of data and audio signals by means of perceptual coding |
US5526427A (en) | 1994-07-22 | 1996-06-11 | A.C. Nielsen Company | Universal broadcast code and multi-level encoded signal monitoring system |
JPH08288928A (en) | 1995-04-14 | 1996-11-01 | Toshiba Corp | Spread spectrum communication equipment |
US5613004A (en) * | 1995-06-07 | 1997-03-18 | The Dice Company | Steganographic method and device |
US5822360A (en) | 1995-09-06 | 1998-10-13 | Solana Technology Development Corporation | Method and apparatus for transporting auxiliary data in audio signals |
CA2184949C (en) | 1995-09-28 | 2000-05-30 | Ingemar J. Cox | Secure spread spectrum watermarking for multimedia data |
US5850249A (en) | 1995-10-12 | 1998-12-15 | Nielsen Media Research, Inc. | Receiver monitoring system with local encoding |
US5822432A (en) * | 1996-01-17 | 1998-10-13 | The Dice Company | Method for human-assisted random key generation and application for digital watermark system |
US6584138B1 (en) * | 1996-03-07 | 2003-06-24 | Fraunhofer-Gesellschaft Zur Foerderung Der Angewandten Forschung E.V. | Coding process for inserting an inaudible data signal into an audio signal, decoding process, coder and decoder |
US5664018A (en) * | 1996-03-12 | 1997-09-02 | Leighton; Frank Thomson | Watermarking process resilient to collusion attacks |
US5949885A (en) * | 1996-03-12 | 1999-09-07 | Leighton; F. Thomson | Method for protecting content using watermarking |
US5893067A (en) | 1996-05-31 | 1999-04-06 | Massachusetts Institute Of Technology | Method and apparatus for echo data hiding in audio signals |
US6078664A (en) * | 1996-12-20 | 2000-06-20 | Moskowitz; Scott A. | Z-transform implementation of digital watermarks |
WO1998003014A1 (en) | 1996-07-16 | 1998-01-22 | Philips Electronics N.V. | Detecting a watermark embedded in an information signal |
US6282299B1 (en) * | 1996-08-30 | 2001-08-28 | Regents Of The University Of Minnesota | Method and apparatus for video watermarking using perceptual masks |
US5848155A (en) * | 1996-09-04 | 1998-12-08 | Nec Research Institute, Inc. | Spread spectrum watermark for embedded signalling |
US5825892A (en) * | 1996-10-28 | 1998-10-20 | International Business Machines Corporation | Protecting images with an image watermark |
US5940135A (en) * | 1997-05-19 | 1999-08-17 | Aris Technologies, Inc. | Apparatus and method for encoding and decoding information in analog signals |
WO1998053565A1 (en) | 1997-05-19 | 1998-11-26 | Aris Technologies, Inc. | Apparatus and method for embedding and extracting information in analog signals using distributed signal features |
US6427012B1 (en) * | 1997-05-19 | 2002-07-30 | Verance Corporation | Apparatus and method for embedding and extracting information in analog signals using replica modulation |
JP4064506B2 (en) * | 1997-09-17 | 2008-03-19 | パイオニア株式会社 | Digital watermark superimposing method, detecting method and apparatus |
US6145081A (en) * | 1998-02-02 | 2000-11-07 | Verance Corporation | Method and apparatus for preventing removal of embedded information in cover signals |
-
1998
- 1998-06-29 US US09/106,213 patent/US6427012B1/en not_active Expired - Lifetime
-
1999
- 1999-06-16 EP EP99930276A patent/EP1095376B1/en not_active Expired - Lifetime
- 1999-06-16 ES ES99930276T patent/ES2297927T3/en not_active Expired - Lifetime
- 1999-06-16 CA CA002335975A patent/CA2335975A1/en not_active Abandoned
- 1999-06-16 JP JP2000557464A patent/JP4217381B2/en not_active Expired - Fee Related
- 1999-06-16 WO PCT/US1999/013482 patent/WO2000000969A1/en active IP Right Grant
- 1999-06-16 DE DE69938135T patent/DE69938135T2/en not_active Expired - Lifetime
- 1999-06-16 KR KR1020007015075A patent/KR20010053329A/en not_active Application Discontinuation
- 1999-06-16 AT AT99930276T patent/ATE386322T1/en not_active IP Right Cessation
-
2002
- 2002-07-29 US US10/206,826 patent/US6683958B2/en not_active Expired - Fee Related
-
2004
- 2004-01-26 US US10/763,288 patent/US7606366B2/en not_active Expired - Fee Related
-
2009
- 2009-04-17 US US12/426,158 patent/US8085935B2/en not_active Expired - Fee Related
-
2011
- 2011-12-09 US US13/315,595 patent/US8474059B2/en not_active Expired - Fee Related
-
2013
- 2013-06-24 US US13/925,676 patent/US20130283402A1/en not_active Abandoned
Cited By (158)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060188128A1 (en) * | 1993-11-18 | 2006-08-24 | Rhoads Geoffrey B | Method and System for Managing and Controlling Electronic Media |
US7313251B2 (en) | 1993-11-18 | 2007-12-25 | Digimarc Corporation | Method and system for managing and controlling electronic media |
US8073193B2 (en) | 1994-10-21 | 2011-12-06 | Digimarc Corporation | Methods and systems for steganographic processing |
US20090080694A1 (en) * | 1995-05-08 | 2009-03-26 | Levy Kenneth L | Deriving Multiple Identifiers from Multimedia Content |
US7460726B2 (en) | 1995-05-08 | 2008-12-02 | Digimarc Corporation | Integrating steganographic encoding in multimedia content |
US20030103645A1 (en) * | 1995-05-08 | 2003-06-05 | Levy Kenneth L. | Integrating digital watermarks in multimedia content |
US6744906B2 (en) | 1995-05-08 | 2004-06-01 | Digimarc Corporation | Methods and systems using multiple watermarks |
US6763123B2 (en) | 1995-05-08 | 2004-07-13 | Digimarc Corporation | Detection of out-of-phase low visibility watermarks |
US20050058320A1 (en) * | 1995-05-08 | 2005-03-17 | Rhoads Geoffrey B. | Identification document including multiple watermarks |
US7224819B2 (en) | 1995-05-08 | 2007-05-29 | Digimarc Corporation | Integrating digital watermarks in multimedia content |
US7991184B2 (en) | 1995-05-08 | 2011-08-02 | Digimarc Corporation | Apparatus to process images and video |
US7870393B2 (en) | 1995-06-07 | 2011-01-11 | Wistaria Trading, Inc. | Steganographic method and device |
US8549305B2 (en) | 1995-06-07 | 2013-10-01 | Wistaria Trading, Inc. | Steganographic method and device |
US8046841B2 (en) | 1995-06-07 | 2011-10-25 | Wistaria Trading, Inc. | Steganographic method and device |
US7761712B2 (en) | 1995-06-07 | 2010-07-20 | Wistaria Trading, Inc. | Steganographic method and device |
US8467525B2 (en) | 1995-06-07 | 2013-06-18 | Wistaria Trading, Inc. | Steganographic method and device |
US8238553B2 (en) | 1995-06-07 | 2012-08-07 | Wistaria Trading, Inc | Steganographic method and device |
US9104842B2 (en) | 1996-01-17 | 2015-08-11 | Scott A. Moskowitz | Data protection method and device |
US9191205B2 (en) | 1996-01-17 | 2015-11-17 | Wistaria Trading Ltd | Multiple transform utilization and application for secure digital watermarking |
US9191206B2 (en) | 1996-01-17 | 2015-11-17 | Wistaria Trading Ltd | Multiple transform utilization and application for secure digital watermarking |
US9171136B2 (en) | 1996-01-17 | 2015-10-27 | Wistaria Trading Ltd | Data protection method and device |
US8930719B2 (en) | 1996-01-17 | 2015-01-06 | Scott A. Moskowitz | Data protection method and device |
US8265276B2 (en) | 1996-01-17 | 2012-09-11 | Moskowitz Scott A | Method for combining transfer functions and predetermined key creation |
US9021602B2 (en) | 1996-01-17 | 2015-04-28 | Scott A. Moskowitz | Data protection method and device |
US7987371B2 (en) | 1996-07-02 | 2011-07-26 | Wistaria Trading, Inc. | Optimization methods for the insertion, protection, and detection of digital watermarks in digital data |
US7822197B2 (en) | 1996-07-02 | 2010-10-26 | Wistaria Trading, Inc. | Optimization methods for the insertion, protection, and detection of digital watermarks in digital data |
US7647502B2 (en) | 1996-07-02 | 2010-01-12 | Wistaria Trading, Inc. | Optimization methods for the insertion, protection, and detection of digital watermarks in digital data |
US7664958B2 (en) | 1996-07-02 | 2010-02-16 | Wistaria Trading, Inc. | Optimization methods for the insertion, protection and detection of digital watermarks in digital data |
US9830600B2 (en) | 1996-07-02 | 2017-11-28 | Wistaria Trading Ltd | Systems, methods and devices for trusted transactions |
US8175330B2 (en) | 1996-07-02 | 2012-05-08 | Wistaria Trading, Inc. | Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data |
US9070151B2 (en) | 1996-07-02 | 2015-06-30 | Blue Spike, Inc. | Systems, methods and devices for trusted transactions |
US7647503B2 (en) | 1996-07-02 | 2010-01-12 | Wistaria Trading, Inc. | Optimization methods for the insertion, projection, and detection of digital watermarks in digital data |
US9843445B2 (en) | 1996-07-02 | 2017-12-12 | Wistaria Trading Ltd | System and methods for permitting open access to data objects and for securing data within the data objects |
US20080022114A1 (en) * | 1996-07-02 | 2008-01-24 | Wistaria Trading, Inc. | Optimization methods for the insertion, protection, and detection of digital watermarks in digital data |
US7991188B2 (en) | 1996-07-02 | 2011-08-02 | Wisteria Trading, Inc. | Optimization methods for the insertion, protection, and detection of digital watermarks in digital data |
US8281140B2 (en) | 1996-07-02 | 2012-10-02 | Wistaria Trading, Inc | Optimization methods for the insertion, protection, and detection of digital watermarks in digital data |
US7953981B2 (en) | 1996-07-02 | 2011-05-31 | Wistaria Trading, Inc. | Optimization methods for the insertion, protection, and detection of digital watermarks in digital data |
US7770017B2 (en) | 1996-07-02 | 2010-08-03 | Wistaria Trading, Inc. | Method and system for digital watermarking |
US7779261B2 (en) | 1996-07-02 | 2010-08-17 | Wistaria Trading, Inc. | Method and system for digital watermarking |
US8161286B2 (en) | 1996-07-02 | 2012-04-17 | Wistaria Trading, Inc. | Method and system for digital watermarking |
US8774216B2 (en) | 1996-07-02 | 2014-07-08 | Wistaria Trading, Inc. | Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management |
US8307213B2 (en) | 1996-07-02 | 2012-11-06 | Wistaria Trading, Inc. | Method and system for digital watermarking |
US7830915B2 (en) | 1996-07-02 | 2010-11-09 | Wistaria Trading, Inc. | Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments |
US7844074B2 (en) | 1996-07-02 | 2010-11-30 | Wistaria Trading, Inc. | Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data |
US7930545B2 (en) | 1996-07-02 | 2011-04-19 | Wistaria Trading, Inc. | Optimization methods for the insertion, protection, and detection of digital watermarks in digital data |
US9258116B2 (en) | 1996-07-02 | 2016-02-09 | Wistaria Trading Ltd | System and methods for permitting open access to data objects and for securing data within the data objects |
US7877609B2 (en) | 1996-07-02 | 2011-01-25 | Wistaria Trading, Inc. | Optimization methods for the insertion, protection, and detection of digital watermarks in digital data |
US8121343B2 (en) | 1996-07-02 | 2012-02-21 | Wistaria Trading, Inc | Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data |
US8225099B2 (en) | 1996-12-20 | 2012-07-17 | Wistaria Trading, Inc. | Linear predictive coding implementation of digital watermarks |
US7730317B2 (en) | 1996-12-20 | 2010-06-01 | Wistaria Trading, Inc. | Linear predictive coding implementation of digital watermarks |
US6804376B2 (en) | 1998-01-20 | 2004-10-12 | Digimarc Corporation | Equipment employing watermark-based authentication function |
US20070172097A1 (en) * | 1998-01-20 | 2007-07-26 | Rhoads Geoffrey B | Methods to Evaluate Images, Video and Documents |
US7664263B2 (en) | 1998-03-24 | 2010-02-16 | Moskowitz Scott A | Method for combining transfer functions with predetermined key creation |
US8542831B2 (en) | 1998-04-02 | 2013-09-24 | Scott A. Moskowitz | Multiple transform utilization and application for secure digital watermarking |
US7738659B2 (en) | 1998-04-02 | 2010-06-15 | Moskowitz Scott A | Multiple transform utilization and application for secure digital watermarking |
US8745404B2 (en) | 1998-05-28 | 2014-06-03 | Verance Corporation | Pre-processed information embedding system |
US9117270B2 (en) | 1998-05-28 | 2015-08-25 | Verance Corporation | Pre-processed information embedding system |
US8526611B2 (en) | 1999-03-24 | 2013-09-03 | Blue Spike, Inc. | Utilizing data reduction in steganographic and cryptographic systems |
US9270859B2 (en) | 1999-03-24 | 2016-02-23 | Wistaria Trading Ltd | Utilizing data reduction in steganographic and cryptographic systems |
US8160249B2 (en) | 1999-03-24 | 2012-04-17 | Blue Spike, Inc. | Utilizing data reduction in steganographic and cryptographic system |
US8781121B2 (en) | 1999-03-24 | 2014-07-15 | Blue Spike, Inc. | Utilizing data reduction in steganographic and cryptographic systems |
US7664264B2 (en) | 1999-03-24 | 2010-02-16 | Blue Spike, Inc. | Utilizing data reduction in steganographic and cryptographic systems |
US10461930B2 (en) | 1999-03-24 | 2019-10-29 | Wistaria Trading Ltd | Utilizing data reduction in steganographic and cryptographic systems |
US9710669B2 (en) | 1999-08-04 | 2017-07-18 | Wistaria Trading Ltd | Secure personal content server |
US8739295B2 (en) | 1999-08-04 | 2014-05-27 | Blue Spike, Inc. | Secure personal content server |
US8789201B2 (en) | 1999-08-04 | 2014-07-22 | Blue Spike, Inc. | Secure personal content server |
US8171561B2 (en) | 1999-08-04 | 2012-05-01 | Blue Spike, Inc. | Secure personal content server |
US9934408B2 (en) | 1999-08-04 | 2018-04-03 | Wistaria Trading Ltd | Secure personal content server |
US7813506B2 (en) | 1999-12-07 | 2010-10-12 | Blue Spike, Inc | System and methods for permitting open access to data objects and for securing data within the data objects |
US8798268B2 (en) | 1999-12-07 | 2014-08-05 | Blue Spike, Inc. | System and methods for permitting open access to data objects and for securing data within the data objects |
US8767962B2 (en) | 1999-12-07 | 2014-07-01 | Blue Spike, Inc. | System and methods for permitting open access to data objects and for securing data within the data objects |
US10644884B2 (en) | 1999-12-07 | 2020-05-05 | Wistaria Trading Ltd | System and methods for permitting open access to data objects and for securing data within the data objects |
US8265278B2 (en) | 1999-12-07 | 2012-09-11 | Blue Spike, Inc. | System and methods for permitting open access to data objects and for securing data within the data objects |
US8538011B2 (en) | 1999-12-07 | 2013-09-17 | Blue Spike, Inc. | Systems, methods and devices for trusted transactions |
US10110379B2 (en) | 1999-12-07 | 2018-10-23 | Wistaria Trading Ltd | System and methods for permitting open access to data objects and for securing data within the data objects |
US8451086B2 (en) | 2000-02-16 | 2013-05-28 | Verance Corporation | Remote control signaling using audio watermarks |
US8791789B2 (en) | 2000-02-16 | 2014-07-29 | Verance Corporation | Remote control signaling using audio watermarks |
US9189955B2 (en) | 2000-02-16 | 2015-11-17 | Verance Corporation | Remote control signaling using audio watermarks |
US8763144B2 (en) | 2000-03-10 | 2014-06-24 | Digimarc Corporation | Associating first and second watermarks with audio or video content |
US20070047763A1 (en) * | 2000-03-10 | 2007-03-01 | Levy Kenneth L | Associating First and Second Watermarks with Audio or Video Content |
US9292663B2 (en) | 2000-03-10 | 2016-03-22 | Digimarc Corporation | Associating first and second watermarks with audio or video content |
US8095989B2 (en) | 2000-03-10 | 2012-01-10 | Digimarc Corporation | Associating first and second watermarks with audio or video content |
US20100313278A1 (en) * | 2000-03-10 | 2010-12-09 | Levy Kenneth L | Associating first and second watermarks with audio or video content |
US7690041B2 (en) | 2000-03-10 | 2010-03-30 | Digimarc Corporation | Associating first and second watermarks with audio or video content |
US20010036292A1 (en) * | 2000-03-18 | 2001-11-01 | Levy Kenneth L. | Feature-based watermarks and watermark detection strategies |
US7020303B2 (en) | 2000-03-18 | 2006-03-28 | Digimarc Corporation | Feature-based watermarks and watermark detection strategies |
US7738673B2 (en) | 2000-04-19 | 2010-06-15 | Digimarc Corporation | Low visible digital watermarks |
US9179033B2 (en) | 2000-04-19 | 2015-11-03 | Digimarc Corporation | Digital watermarking in data representing color channels |
US20060008112A1 (en) * | 2000-04-19 | 2006-01-12 | Reed Alastair M | Low visible digital watermarks |
US9940685B2 (en) | 2000-04-19 | 2018-04-10 | Digimarc Corporation | Digital watermarking in data representing color channels |
US8027509B2 (en) | 2000-04-19 | 2011-09-27 | Digimarc Corporation | Digital watermarking in data representing color channels |
US7660700B2 (en) | 2000-09-07 | 2010-02-09 | Blue Spike, Inc. | Method and device for monitoring and analyzing signals |
US7949494B2 (en) | 2000-09-07 | 2011-05-24 | Blue Spike, Inc. | Method and device for monitoring and analyzing signals |
US8712728B2 (en) | 2000-09-07 | 2014-04-29 | Blue Spike Llc | Method and device for monitoring and analyzing signals |
US8214175B2 (en) | 2000-09-07 | 2012-07-03 | Blue Spike, Inc. | Method and device for monitoring and analyzing signals |
US8271795B2 (en) | 2000-09-20 | 2012-09-18 | Blue Spike, Inc. | Security based on subliminal and supraliminal channels for data objects |
US8612765B2 (en) | 2000-09-20 | 2013-12-17 | Blue Spike, Llc | Security based on subliminal and supraliminal channels for data objects |
US20030014634A1 (en) * | 2001-04-06 | 2003-01-16 | Verance Corporation | Methods and apparatus for embedding and recovering watermarking information based on host-matching codes |
US7159118B2 (en) * | 2001-04-06 | 2007-01-02 | Verance Corporation | Methods and apparatus for embedding and recovering watermarking information based on host-matching codes |
US20030012401A1 (en) * | 2001-04-25 | 2003-01-16 | Sharma Ravi K. | Encoded reference signal for digital watermarks |
US7046819B2 (en) | 2001-04-25 | 2006-05-16 | Digimarc Corporation | Encoded reference signal for digital watermarks |
US8170273B2 (en) | 2001-04-25 | 2012-05-01 | Digimarc Corporation | Encoding and decoding auxiliary signals |
US7980596B2 (en) | 2001-12-24 | 2011-07-19 | L-1 Secure Credentialing, Inc. | Increasing thermal conductivity of host polymer used with laser engraving methods and compositions |
US7020304B2 (en) | 2002-01-22 | 2006-03-28 | Digimarc Corporation | Digital watermarking and fingerprinting including synchronization, layering, version control, and compressed embedding |
US7886151B2 (en) | 2002-01-22 | 2011-02-08 | Purdue Research Foundation | Temporal synchronization of video and audio signals |
US20030185417A1 (en) * | 2002-01-22 | 2003-10-02 | Alattar Adnan M. | Digital watermarking and fingerprinting including synchronization, layering, version control, and compressed embedding |
US20050147248A1 (en) * | 2002-03-28 | 2005-07-07 | Koninklijke Philips Electronics N.V. | Window shaping functions for watermarking of multimedia signals |
US8473746B2 (en) | 2002-04-17 | 2013-06-25 | Scott A. Moskowitz | Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth |
US9639717B2 (en) | 2002-04-17 | 2017-05-02 | Wistaria Trading Ltd | Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth |
US8706570B2 (en) | 2002-04-17 | 2014-04-22 | Scott A. Moskowitz | Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth |
US10735437B2 (en) | 2002-04-17 | 2020-08-04 | Wistaria Trading Ltd | Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth |
US8224705B2 (en) | 2002-04-17 | 2012-07-17 | Moskowitz Scott A | Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth |
US8104079B2 (en) | 2002-04-17 | 2012-01-24 | Moskowitz Scott A | Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth |
USRE44307E1 (en) | 2002-04-17 | 2013-06-18 | Scott Moskowitz | Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth |
USRE44222E1 (en) | 2002-04-17 | 2013-05-14 | Scott Moskowitz | Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth |
US9648282B2 (en) | 2002-10-15 | 2017-05-09 | Verance Corporation | Media monitoring, management and information system |
US8806517B2 (en) | 2002-10-15 | 2014-08-12 | Verance Corporation | Media monitoring, management and information system |
US7728048B2 (en) | 2002-12-20 | 2010-06-01 | L-1 Secure Credentialing, Inc. | Increasing thermal conductivity of host polymer used with laser engraving methods and compositions |
US7660982B1 (en) * | 2003-02-27 | 2010-02-09 | Weinblatt Lee S | Subscription broadcast security system |
US7789311B2 (en) | 2003-04-16 | 2010-09-07 | L-1 Secure Credentialing, Inc. | Three dimensional data storage |
US8811655B2 (en) | 2005-04-26 | 2014-08-19 | Verance Corporation | Circumvention of watermark analysis in a host content |
US8340348B2 (en) | 2005-04-26 | 2012-12-25 | Verance Corporation | Methods and apparatus for thwarting watermark detection circumvention |
US8538066B2 (en) | 2005-04-26 | 2013-09-17 | Verance Corporation | Asymmetric watermark embedding/extraction |
US9153006B2 (en) | 2005-04-26 | 2015-10-06 | Verance Corporation | Circumvention of watermark analysis in a host content |
US8549307B2 (en) | 2005-07-01 | 2013-10-01 | Verance Corporation | Forensic marking using a common customization function |
US9009482B2 (en) | 2005-07-01 | 2015-04-14 | Verance Corporation | Forensic marking using a common customization function |
US8781967B2 (en) | 2005-07-07 | 2014-07-15 | Verance Corporation | Watermarking in an encrypted domain |
US8346567B2 (en) | 2008-06-24 | 2013-01-01 | Verance Corporation | Efficient and secure forensic marking in compressed domain |
US8259938B2 (en) | 2008-06-24 | 2012-09-04 | Verance Corporation | Efficient and secure forensic marking in compressed |
US8681978B2 (en) | 2008-06-24 | 2014-03-25 | Verance Corporation | Efficient and secure forensic marking in compressed domain |
US9582844B2 (en) | 2008-12-17 | 2017-02-28 | Digimarc Corporation | Detection from two chrominance directions |
US9117268B2 (en) | 2008-12-17 | 2015-08-25 | Digimarc Corporation | Out of phase digital watermarking in two chrominance directions |
US9245308B2 (en) | 2008-12-17 | 2016-01-26 | Digimarc Corporation | Encoding in two chrominance directions |
US8660298B2 (en) | 2008-12-17 | 2014-02-25 | Digimarc Corporation | Encoding in two chrominance directions |
US20100150434A1 (en) * | 2008-12-17 | 2010-06-17 | Reed Alastair M | Out of Phase Digital Watermarking in Two Chrominance Directions |
US8199969B2 (en) | 2008-12-17 | 2012-06-12 | Digimarc Corporation | Out of phase digital watermarking in two chrominance directions |
US9607131B2 (en) | 2010-09-16 | 2017-03-28 | Verance Corporation | Secure and efficient content screening in a networked environment |
US8838978B2 (en) | 2010-09-16 | 2014-09-16 | Verance Corporation | Content access management using extracted watermark information |
US8838977B2 (en) | 2010-09-16 | 2014-09-16 | Verance Corporation | Watermark extraction and content screening in a networked environment |
US8923548B2 (en) | 2011-11-03 | 2014-12-30 | Verance Corporation | Extraction of embedded watermarks from a host content using a plurality of tentative watermarks |
US8682026B2 (en) | 2011-11-03 | 2014-03-25 | Verance Corporation | Efficient extraction of embedded watermarks in the presence of host content distortions |
US8615104B2 (en) | 2011-11-03 | 2013-12-24 | Verance Corporation | Watermark extraction based on tentative watermarks |
US8533481B2 (en) | 2011-11-03 | 2013-09-10 | Verance Corporation | Extraction of embedded watermarks from a host content based on extrapolation techniques |
US8745403B2 (en) | 2011-11-23 | 2014-06-03 | Verance Corporation | Enhanced content management based on watermark extraction records |
US9547753B2 (en) | 2011-12-13 | 2017-01-17 | Verance Corporation | Coordinated watermarking |
US9323902B2 (en) | 2011-12-13 | 2016-04-26 | Verance Corporation | Conditional access using embedded watermarks |
US9571606B2 (en) | 2012-08-31 | 2017-02-14 | Verance Corporation | Social media viewing system |
US8869222B2 (en) | 2012-09-13 | 2014-10-21 | Verance Corporation | Second screen content |
US9106964B2 (en) | 2012-09-13 | 2015-08-11 | Verance Corporation | Enhanced content distribution using advertisements |
US8726304B2 (en) | 2012-09-13 | 2014-05-13 | Verance Corporation | Time varying evaluation of multimedia content |
US9858596B2 (en) | 2013-02-06 | 2018-01-02 | Muzak Llc | System for targeting location-based communications |
US9317872B2 (en) | 2013-02-06 | 2016-04-19 | Muzak Llc | Encoding and decoding an audio watermark using key sequences comprising of more than two frequency components |
US9099080B2 (en) | 2013-02-06 | 2015-08-04 | Muzak Llc | System for targeting location-based communications |
US9424594B2 (en) | 2013-02-06 | 2016-08-23 | Muzak Llc | System for targeting location-based communications |
US9262794B2 (en) | 2013-03-14 | 2016-02-16 | Verance Corporation | Transactional video marking system |
US9251549B2 (en) | 2013-07-23 | 2016-02-02 | Verance Corporation | Watermark extractor enhancements based on payload ranking |
US9208334B2 (en) | 2013-10-25 | 2015-12-08 | Verance Corporation | Content management using multiple abstraction layers |
US9596521B2 (en) | 2014-03-13 | 2017-03-14 | Verance Corporation | Interactive content acquisition using embedded codes |
Also Published As
Publication number | Publication date |
---|---|
US20120084870A1 (en) | 2012-04-05 |
US8085935B2 (en) | 2011-12-27 |
EP1095376A1 (en) | 2001-05-02 |
US20130283402A1 (en) | 2013-10-24 |
US7606366B2 (en) | 2009-10-20 |
EP1095376B1 (en) | 2008-02-13 |
WO2000000969A1 (en) | 2000-01-06 |
US6427012B1 (en) | 2002-07-30 |
DE69938135D1 (en) | 2008-03-27 |
JP4217381B2 (en) | 2009-01-28 |
CA2335975A1 (en) | 2000-01-06 |
US8474059B2 (en) | 2013-06-25 |
US20040151316A1 (en) | 2004-08-05 |
JP2002519916A (en) | 2002-07-02 |
US20030063747A1 (en) | 2003-04-03 |
ATE386322T1 (en) | 2008-03-15 |
US6683958B2 (en) | 2004-01-27 |
KR20010053329A (en) | 2001-06-25 |
DE69938135T2 (en) | 2009-03-26 |
ES2297927T3 (en) | 2008-05-01 |
US20090262932A1 (en) | 2009-10-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6427012B1 (en) | Apparatus and method for embedding and extracting information in analog signals using replica modulation | |
EP1002388B1 (en) | Apparatus and method for embedding and extracting information in analog signals using distributed signal features | |
US6175627B1 (en) | Apparatus and method for embedding and extracting information in analog signals using distributed signal features | |
Swanson et al. | Multimedia data-embedding and watermarking technologies | |
US7552336B2 (en) | Watermarking with covert channel and permutations | |
Kirovski et al. | Blind pattern matching attack on watermarking systems | |
EP1132895B1 (en) | Watermarking generation method for audio signals | |
Muharemagic et al. | Survey of watermarking techniques and applications | |
Petrovic | Audio signal watermarking based on replica modulation | |
Petrovic et al. | Data hiding within audio signals | |
US20020184503A1 (en) | Watermarking | |
Muharemagic et al. | Multimedia security: watermarking techniques | |
Mitrakas | Policy frameworks for secure electronic business | |
Gupta | Improving the Performance of Spread Spectrum Audio Watermarking by Minimising the Cost Function | |
Patil | Intelligent encoder and decoder model for robust and secure audio watermarking | |
Lobina et al. | Masking Models and Watermarking | |
HUSAIN | Sottor of^ I) iIos (opf) p | |
Metois | DATA HIDING WITHIN AUDIO SIGNALS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ARIS TECHNOLOGIES, INC., MASSACHUSETTS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PETROVIC, RADE;REEL/FRAME:009294/0308 Effective date: 19980626 |
|
AS | Assignment |
Owner name: VERANCE CORPORATION, CALIFORNIA Free format text: MERGER;ASSIGNOR:ARIS TECHNOLOGIES, INC.;REEL/FRAME:010756/0390 Effective date: 19991108 |
|
AS | Assignment |
Owner name: VERANCE CORPORATION, (DELAWARE CORPORATION), CALIF Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ARIS TECHNOLOGIES, INC., (MASSACHUSETTS CORPORATION);REEL/FRAME:012391/0546 Effective date: 20010628 |
|
AS | Assignment |
Owner name: CONSTELLATION VENTURE CAPITAL II, L.P., NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:VERANCE CORPORATION;REEL/FRAME:012785/0477 Effective date: 20020401 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: CONSTELLATION VENTURE CAPITAL II, L.P., AS AGENT, Free format text: SECURITY INTEREST;ASSIGNOR:VERANCE CORPORATION;REEL/FRAME:013669/0379 Effective date: 20030108 |
|
AS | Assignment |
Owner name: SILICON VALLEY BANK,CALIFORNIA Free format text: SECURITY AGREEMENT;ASSIGNOR:VERANCE CORPORATION;REEL/FRAME:016334/0028 Effective date: 20050602 Owner name: SILICON VALLEY BANK, CALIFORNIA Free format text: SECURITY AGREEMENT;ASSIGNOR:VERANCE CORPORATION;REEL/FRAME:016334/0028 Effective date: 20050602 |
|
AS | Assignment |
Owner name: VERANCE CORPORATION,CALIFORNIA Free format text: RELEASE;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:017458/0976 Effective date: 20051227 Owner name: VERANCE CORPORATION, CALIFORNIA Free format text: RELEASE;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:017458/0976 Effective date: 20051227 |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FEPP | Fee payment procedure |
Free format text: PAT HOLDER NO LONGER CLAIMS SMALL ENTITY STATUS, ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: STOL); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
SULP | Surcharge for late payment | ||
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 12 |
|
AS | Assignment |
Owner name: VERANCE CORPORATION, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CONSTELLATION VENTURE CAPITAL II, L.P.;REEL/FRAME:035140/0242 Effective date: 20141231 Owner name: VERANCE CORPORATION, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CONSTELLATION VENTURE CAPITAL II, L.P.;REEL/FRAME:035187/0351 Effective date: 20141231 |