`
`PCT/U897” 1 455
`
`17.
`
`A method of dithering watermark quantizations such that the
`
`dither changes an absolute quantization value, but does not change a
`
`U
`
`quantization level or information carried in the quantization.
`
`18.
`
`A method of encoding watermarks comprising steps of:
`
`inverting at least one instance of the watermark bit stream; and
`
`encoding at least one instance of the watermark using said inverted
`
`instance of the watermark bit stream.
`
`19.
`
`A method of decoding watermarks comprising steps of:
`
`considering an original watermark synchronization marker, an inverted
`
`watermark synchronization marker, and inverted watermarks; and
`
`decoding based on the considering step.
`
`20.
`
`A method of encoding and decoding watermarks in a signal
`
`using a spread spectrum technique to encode or decode where information is
`
`encoded or decoded at audible levels and the encoding and decoding
`
`methods are pseudo-random over frequency.
`
`
`
`
`
`hunt-4sumphuNl—t
`
`hUNl—J
`
`H
`
`21.
`
`A method of encoding and decoding watermarks in a signal
`
`using a spread spectrum technique to encode or decode where information is
`
`encoded or decoded at audible levels and the encoding and decoding
`
`methods are pseudo-random over time.
`
`22.
`
`The method of claim 21, wherein the information is encoded or
`
`decoded at audible levels and the encoding and decoding methods are
`
`pseudo—random, over both frequency and time.
`
`23.
`
`A method of analyzing composite digitized signals for
`
`watermarks comprising steps of:
`
`37
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1399
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1399
`
`
`
`WO 98/02864
`
`PCT/11897111455
`
`\DNQOtUI-bw
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`\DODQONU'l-hUNl-‘l
`HHHl-‘Hpump-Io
`
`obtaining a composite signal;
`
`obtaining an unwatermarked sample signal;
`
`time aligning the unwatermarked sample signal to the
`
`composite signal;
`
`gain adjusting the time aligned unwatermarked sample signal to
`
`a corresponding segment of the composite signal, determined in the
`
`time aligning step;
`
`estimating a pre-composite signal using the composite signal
`
`and the gain adjusted unwatermarked sample signal;
`
`estimating a watermarked sample signal by subtracting the
`
`estimated pre-composite signal from the composite signal; and
`
`scanning the estimated watermarked sample signal for
`
`watermarks.
`
`24.
`
`A method for varying watermark encode/decode algorithms
`
`automatically during the encoding or decoding of a watermark comprising
`
`steps of:
`
`a)
`
`assigning a list of desired CODECs to a list of corresponding
`
`signal characteristics which indicate use of particular CODECs;
`
`b)
`
`during encoding/decoding, analyzing characteristics of the
`
`current sample frame in the signal stream, prior to delivering the frame to a
`
`CODEC;
`
`c)
`
`looking up the corresponding CODEC from the list of CODECs
`
`in step (a) which matches the observed signal characteristics from step (b);
`
`d)
`
`e)
`
`and
`
`loading and/or preparing the desired CODEC;
`
`passing the sample frame to the CODEC selected in step (c);
`
`f)
`
`receiving the output samples from step (e).
`
`25.
`
`The method according to claim 24, wherein watermark signal
`
`characteristics or a watermark certificate can be compressed.
`
`38
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1400
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1400
`
`
`
`WO 98/02864
`
`I
`
`PCT/U89 7/1 1455
`
`26.
`
`A method for varying watermark encode/decode algorithms
`
`automatically during the encoding or decoding of a watermark comprising
`
`steps of:
`
`a)
`
`assigning a list of desired CODECs to a list of index values
`
`which correspond to values computed as a function of the pseudo—random
`
`watermark key and the state of the processing framework;
`
`b)
`
`during encoding/decoding, computing the pseudo-random key
`
`index value for the current sample frame in the signal stream, prior to
`
`delivering the frame to a CODEC;
`
`c)
`
`looking up the corresponding CODEC from the list of CODECs
`
`in step (a) which matches the index value from step (b);
`
`d)
`
`e)
`
`and
`
`loading and/or preparing the desired CODEC;
`
`passing the sample frame to the CODEC selected in step (c);
`
`f)
`
`receiving the output samples from step (e).
`
`tometUl-wal-J
`I-IHHHHpump-o
`
`H U1
`
`27.
`
`The method according to claim 26, wherein watermark signal
`
`characteristics or a watermark certificate can be compressed.
`
`39
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1401
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1401
`
`
`
`INTERNATIONAL SEARCH REPORT
`
`lntcmational application No,
`
`PCT/U897/11455
`
`CLASSIFICATION OF SUBJECT MATTER
`A.
`lPC(6}
`:GO9C 5/00 H04L 9/00
`US CL
`2380/54, 3, 4, 23, 55; 283/73, 113. 17
`According to International Patent Classification (lPC) or to both national classification and IPC
`B.
`FIELDS SEARCHED
`
`
`
`Minimum documentation searched (classification system followed by classification symbols)
`US,
`:
`380/54, 3. 4. 23, 55, 49, Si, 59; 283/73. H3. 17
`
`Documentation searched other than minimum documentation to the extent that such documents are included in the fields searched
`
`
`
`Electronic data base consulted during the intemetional search (name of data base and, where practicable. search terms used)
`
`C.
`
`DOCUMENTS CONSIDERED TO BE RELEVANT
`
`Citation of document. with indication. where appropriate. of the relevant passages
`
`Relevant to claim No.
`
`US 5,664,018 A (LEIGHTON) 02 SEPTEMBER 1997
`
`
`
`US 5,617,119 A (BRIGGS ET AL.) 01 APRIL 1997
`
`US 5,568,570 A (RABBANI) 22 OCTOBER 1996
`
`US 5,530,759 A (BRAUDAWAY, ET AL.) 25 JUNE 1996
`
`US 5,493,677 A (BALOGH, ET AL.) 20 FEBRUARY 1996
`
` US, 5,636,292 A (RHOADS) 03 JUNE 1997
`
`
`
`'A'
`_
`_
`E
`'L'
`
`'0'
`
`document defining the general state of the art which in not considered
`to be of particular relevance
`.
`.
`V
`.
`.
`“m" document publuhed on or In" the international film; an.
`document which may throw doubt- on priority claim(e) or which is
`cited to establish the publication date of another citation or other
`apeeial reason (as apemfied)
`document referring to an oral disclosure. use. exhibition or other
`[HG-Ill
`
`
`
`
`
`
`
`
`
`
`
`
`
`’P'
`document published prior to the international filing date but later than
`-.'-
`dogma.“ numb" of the “m. patent (“my
`the pnenty data elauned
`
`Date of the actual completion of the international search
` Date of mailing of the intemational search report
`
`23 OCTOBER 1997
`
`2 3 DEC 1997
`
`
`Auth-rized officer
`Home and meiling address of the ISA/US
`
`
`Commissioner of Patents and Trademarks
`Box PCT
`
`
`
`Washington. DC. 2023]
`
`Facsimile No.
`(703) 305-3230
`
`
`
`Form PCT/ISA/2l0 (second shoetXJuly I992)!v
`
`D Further documents are listed in the continuation of Box C. D See patent family annex.
`Special categories of oiled doeumenta:
`
`
`later document published after the international filing data or priority
`data and not in conflict with the application but citad to understand
`the principle or theory “mum; the invention
`document of particular relevance; the claimed invention cannot be
`considered novel or cannot be considered to involve an inventive step
`when the document is taken alone
`
`'X'
`
`'Y'
`
`document of particular relevance; the claimed invention cannot be
`considered to involve an inventive step when the document
`is
`combined with one or more other such doeumenta. such combination
`being obvtoua to a pcraon skilled in the art
`
`DAVID CAIN
`l/
`
`/
`elephone No.
`
`(703) 305-1836
`
`"
`
`/
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1402
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1402
`
`
`
`~
`
`PCT
`
`International Bureau
`WORLD INTELLECTUAL PROPERTY ORGANIZATION
`
`
`
`A1
`
`(11) International Publication Number:
`
`WO 00/57643
`
`
`(43) International Publication Date:
`
`28 September 2000 (28.09.00)
`
`INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT)
`(51) International Patent Classification 7 :
`
`
`H04N 7/167
`
`
`
`
`(21) International Application Number:
`
`PCT/USOO/06522
`
`(22) International Filing Date:
`
`14 March 2000 (14.03.00)
`
`(81) Designated States: JP, US, European patent (AT, BE, CH, CY,
`DE, DK, ES, FI, FR, GB, GR, IE, IT, LU, MC, NL, PT,
`SE).
`
`Published
`With international search report.
`Before the expiration of the time limit for amending the
`claims and to be republished in the event of the receipt of
`amendments.
`
`(30) Priority Data:
`60/125,990
`
`24 March 1999 (24.03.99)
`
`US
`
`(71) Applicant (for all designated States except US): BLUE SPIKE,
`INC. [US/US]; 16711 Collins Avenue, Miami, FL 33160
`(US).
`
`(72) Inventors; and
`(75) Inventors/Applicants (for US only): MOSKOWITZ, Scott,
`A.
`[US/US]; 1671] Collins Avenue, Miami, FL 33160
`(US). BERRY, Michael [US/US]; 12401 Princess Jeanne,
`Albuquerque, NM 87112 (US).
`
`(74) Agents: CHAPMAN, Floyd, B. et 211.; Baker Botts, L.L.P., 1299
`Pennsylvania Avenue, N.W., Washington, DC 20004 (US).
`
`
`(54) Title: UTILIZING DATA REDUCTION IN STEGANOGRAPHIC AND CRYPTOGRAPHIC SYSTEMS
`
`(57) Abstract
`
`The present invention is a method for protecting a
`data signal where the method comprises the following steps:
`applying a data reduction technique (200) to the signal to
`produce a reduced signal, subtracting (60) the reduced data
`signal from the original signal to produce a remainder signal
`(39), embedding (300) a first watermark into the reduced
`data signal to produce a watermarked redued data signal,
`and adding (50) the watermarked reduced signal
`to the
`remainder signal to produce an output signal (90). A second
`watermark (301) may be embedded into the remainder
`signal (39) before the final addition (50) step. Cryptographic
`techniques may be employed to encrypt the remainder signal
`and/or the reduced signal prior to the addition step (50).
`
`ORIGINAL
`316”“-
`
`10
`
`30
`
`Q
`
`tsTREMAINDER
`
` 20
`
`
`157 DATAREDUCED
`SIGNAL
`
`
`
`
`
`2°
`
`'9 SUBTRACTION
`-
`
`2NDREMAINDER
`
`
`
`
`101
`
`2NDDATAREDUC110N
`21
`2ND DATA REDUCED
`SlGNAL
`
`28
`
`SUBTRACTION
`109
`
`nTH REMAINDER
`
`
`
`TH DATAREDUEIION
`
`nTH DATA REDUCED SIGNAL
`
`
`
`
`
`
`'83
`
`
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1403
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1403
`
`
`
`
`
`
`
`FOR THE PURPOSES OF INFORMATION ONLY
`
`Codes used to identify States party to the PCT on the front pages of pamphlets publishing international applications under the PCT.
`
`AL
`AM
`AT
`AU
`AZ
`BA
`BB
`BE
`BF
`BG
`B.)
`BR
`BY
`CA
`CF
`CG
`CH
`CI
`CM
`CN
`CU
`CZ
`DE
`DK
`EE
`
`Albania
`Armenia
`Austria
`Australia
`Azerbaijan
`Bosnia and Herzegovina
`Barbados
`Belgium
`Burkina Faso
`Bulgaria
`Benin
`Brazil
`Belarus
`Canada
`Cemral African Republic
`Congo
`Switzerland
`cote d’Ivoire
`Cameroon
`China
`Cuba
`Czech Republic
`Germany
`Denmark
`Estonia
`
`ES
`FI
`FR
`GA
`GB
`GE
`GH
`GN
`GR
`HU
`IE
`IL
`IS
`IT
`JP
`KE
`KG
`KP
`
`KR
`KZ
`LC
`LI
`LK
`LR
`
`Spain
`Finland
`France
`Gabon
`United Kingdom
`Georgia
`Ghana
`Guinea
`Greece
`Hungary
`Ireland
`Israel
`Iceland
`Italy
`Japan
`Kenya
`Kyrgyzstan
`Democratic People’s
`Republic of Korea
`Republic of Korea
`Kazakstan
`Saint Lucia
`Liechtenstein
`Sri Lanka
`Liberia
`
`LS
`LT
`LU
`LV
`MC
`MD
`MG
`MK
`
`ML
`MN
`MR
`MW
`MX
`NE
`NL
`N0
`NZ
`PL
`PT
`R0
`RU
`SD
`SE
`SG
`
`Lesotho
`Lithuania
`Luxembourg
`Latvia
`Monaco
`Republic of Moldova
`Madagascar
`The former Yugoslav
`Republic of Macedonia
`Mali
`Mongolia
`Mauritania
`Malawi
`Mexico
`Niger
`Netherlands
`Norway
`New Zealand
`Poland
`Portugal
`Romania
`Russian Federation
`Sudan
`Sweden
`Singapore
`
`SI
`SK
`SN
`SZ
`TD
`TG
`TJ
`TM
`TR
`TT
`UA
`UG
`US
`UZ
`VN
`YU
`ZW
`
`Slovenia
`Slovakia
`Senegal
`Swaziland
`Chad
`Togo
`Tajikistan
`Turkmenistan
`Turkey
`Trinidad and Tobago
`Ukraine
`Uganda
`United States of America
`Uzbekistan
`Viet Nam
`Yugoslavia
`Zimbabwe
`
`
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1404
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1404
`
`
`
`WO 00/57643
`
`PCT/USOO/06522
`
`UTILIZING DATA REDUCTION IN STEGANOGRAPHIC
`AND CRYPTOGRAPHIC SYSTEMS
`
`FIELD OF INVENTION
`
`This invention relates to digital signal processing, and more particularly to a
`
`method and a system for encoding at least one digital watermark into a signal as a
`
`means of conveying information relating to the signal and also protecting against
`
`unauthorized manipulation of the signal.
`
`BACKGROUND OF INVENTION
`
`Digital watermarks help to authenticate the content of digitized multimedia
`
`information, and can also discourage piracy. Because piracy is clearly a disincentive
`
`to the digital distribution of copyrighted content, establishment of responsibility for
`
`copies and derivative copies of such works is invaluable. In considering the various
`
`forms of multimedia content, whether "master,” stereo, NTSC video, audio tape or
`
`compact disc, tolerance of quality will vary with individuals and affect the underlying
`
`commercial and aesthetic value of the content.
`
`It is desirable to tie copyrights,
`
`ownership rights, purchaser information or some combination of these and related data
`
`into the content in such a manner that the content must undergo damage, and therefore
`
`reduction of its value, with subsequent, unauthorized distribution, commercial or
`
`otherwise. Digital watermarks address many of these concerns.
`
`A matter of general weakness in digital watermark technology relates directly
`
`to the manner of implementation of the watermark. Many approaches to digital
`
`watermarking leave detection and decode control with the implementing party of the
`
`digital watermark, not the creator of the work to be protected. This weakness removes
`
`proper economic incentives for improvement of the technology. One specific form of
`
`exploitation mostly regards efforts to obscure subsequent watermark detection. Others
`
`regard successful over encoding using the same watermarking process at a subsequent
`
`time. Yet another way to perform secure digital watermark implementation is through
`
`"key-based" approaches.
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1405
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1405
`
`
`
`WO 00/57643
`
`PCT/USDO/06522
`
`Ix)
`
`This paper draws a di
`
`provabl
`
`intended to be low
`
`stinetion between a “forensic watermark,” based on
`"copy control” or “universal” watermark which is
`neral computing or
`
`y-sccure methods, and a
`cost and easily implemented into any ge
`rrnark can be forensic if it can identify the source
`For example, assume that digital data are
`
`unauth
`
`watermark, if presen
`
`A“ (the “A disk”). Company A makes an
`“E disk”). A forensic
`
`ompany B” (the
`
`“A disk,” would identify the “B
`
`consumer electronic device. A wate
`of the data from which a copy was made.
`stored on a disk and provided to “Company
`orized copy and delivers the copy to “C
`t in the digital data stored on the
`c “A disk.”
`disk” as having been copied from th
`On the other hand, a copy control or universal watermark is an embedded signal
`which is governed by a
`”) to increase
`“key” which may be changed (a “session key
`to devices that may offer less than strict
`s
`ecurity, or one that is easily accessible
`“universal” nature of the watermark
`cryptographic security. The
`inexpensive means for accessing or other associating the watermark with operations that
`elude playback, recording or manipulations ofthe media in which it is embedded.
`A fundamental difference is that the universality of a copy cont
`which must be redundant enough to survive many signal manipulations to eliminate
`establishing responsibility
`is at odds with the far greater problem of
`ore
`pected copying of a copyrighted media work. The m
`for a given instance of a sus
`dedicated pirates must be dealt with by encouraging 3rd party authentication with
`“forensic watermarks” or those that constitute “transactional watermarks” (which are
`encoded in a given copy of said content to be watermarked as per the given transaction).
`rt a given information signal
`The goal of a digital watermark system is to inse
`er as to leave little or no evidence of the presence of the
`or signals in such a mann
`information signal in the underlying content signal. A separate but equal goal is
`maximizing the digital watermark’s encoding level and "location sensitivity" in the
`underlying content signal such that the watermark cannot be removed without damage
`
`is the computationally
`
`rol mechanism,
`
`can in
`
`most casual piracy,
`
`to the content signal.
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1406
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1406
`
`
`
`WO 00/57643
`
`‘
`
`PCT/USOO/06522
`
`One means of implementing a digital watermark is to use key-based security.
`A predetermined or random key can be generated as a map to access the hidden
`information signal. A key pair may also be used. With a typical key pair, a party
`possesses a public and a private key. The private key is maintained in confidence by
`the owner of the key, while the owner’s public key is disseminated to those persons in
`h whom the owner would regularly communicate. Messages being
`the public wit
`communicated, for example by the owner to another, are encrypted with the private key
`and can only be read by another person who possesses the corresponding public key.
`Similarly, a message encrypted with the person’s public key can only be decrypted with
`the corresponding private key. Of course, the keys or key pairs may be processed in
`separate software or hardware devices handling the watermarked data.
`
`SUMMARY OF THE [N VENTION
`A method of securing a data signal comprises the steps of: applying a data
`reduction technique to reduce the data signal into a reduced data signal; subtracting said
`reduced data signal from the data signal to produce a remainder signal; using a first
`cryptographic technique to encrypt the reduced data signal to produce an encrypted,
`reduced data signal; using a second cryptographic technique to encrypt the remainder
`signal to produce an encrypted remainder signal; and adding said encrypted, reduced
`data signal to said encrypted remainder signal to produce an output signal.
`
`technique to reduce the
`reduced data signal from the data signal to produce a remainder signal; means to apply
`a first cryptographic technique to encrypt the reduced data signal to produce an
`encrypted, reduced data signal; means to apply a second cryptographic technique to
`encrypt the remainder signal to produce an encrypted remainder signal; and means to
`add said encrypted, reduced data signal to said encrypted remainder signal to produce
`
`an output signal.
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1407
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1407
`
`
`
`WO 00/57643
`
`‘
`
`PCT/USOO/06522
`
`A method of securing a data signal comprises the steps of: applying a data
`reduction technique to reduce the data signal into a reduced data signal; subtracting said
`reduced data signal from the data signal to produce a remainder signal; embedding a
`first watermark into said reduced data signal to produce a watermarked, reduced data
`signal; embedding a second watermark into said remainder signal to produce a
`watermarked remainder signal; and adding said watennarked, reduced data signal to
`said watermarked remainder signal to produce an output signal.
`A method of protecting a data signal comprises: applying a data reduction
`technique to reduce the data signal into a reduced data signal; subtracting said reduced
`data signal from the data signal to produce a remainder signal; using a first scrambling
`technique to scramble said reduced data signal to produce a scrambled, reduced data
`signal; using a second scrambling technique to scramble said remainder signal to
`produce a scrambled remainder signal; and adding said scrambled, reduced data signal
`to said scrambled remainder signal to produce an output signal.
`There are two design goals in an overall digital watermarking system’s low cost,
`and universality. Ideally, a method for encoding and decoding digital watermarks in
`digitized media for copy control purposes should be inexpensive and universal. This
`is essential in preventing casual piracy. On the other hand, a more secure form of
`protection, such as a “forensic watermarks,” can afford to be computationally intensive
`a copy control watermark.
`to decode, but must be unaffected by repeated re-encoding of
`d for achieving these results would separate the signal into different
`An ideal metho
`areas, each of which can be accessed independently. The embedded signal or may
`simply be “watermark bits” or ”executable binary code,” depending on the application
`and type of security sought. Improvements to separation have been made possible by
`enhancing more of the underlying design to meet a number of clearly problematic
`issues. The present invention interprets the signal as a stream which may be split into
`separate streams of digitized samples or may undergo data reduction (including both
`lossy and lossless compression, such as MPEG lossy compression and Meridian’s
`down sampling, common to many studio operations, or any
`
`lossless compression,
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1408
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1408
`
`
`
`WO 00/57643
`
`‘
`
`PCT/USOO/06522
`
`related data reduction process). The stream of data can be digital in nature, or may also
`be an analog waveform (such as an image, audio, video, or multimedia content). One
`example of digital data is executable binary code. When applied to computer code, the
`present invention allows for more efficient, secure, copyright protection when handling
`functionality and associations with predetermined keys and key pairs in software
`applications or the machine readable versions of such code in microchips and hardware
`devices. Text may also be a candidate for authentication or higher levels of secuiity
`when coupled with secure key exchange or asymmetric key generation between parties.
`The subsets of the data stream combine meaningful and meaningless bits of data which
`may be mapped or transferred depending on the application intended by the
`
`implementing party.
`The present invention utilizes data reduction to allow better performance in
`watermarking as well as cryptographic methods concerning binary executable code, its
`machine readable form, text and other functionality-based or communication—related
`applications. Some differences may simply be in the structure of the key itself, a
`pseudo random or random number string or one which also includes additional security
`ures saved to the key. The key may also be
`with special one way functions or signat
`made into key pairs, as is discussed in other disclosures and patents r
`The present invention contemplates watermarks as a plurality of digitized sample
`even if the digitized streams originate from the analog waveform itself. The
`streams,
`also contemplates that the methods disclosed herein can be applied
`present invention
`to non—digitized content. Universally, data reduction adheres to some means of
`“understanding "the reduction. This disclosure looks at data reduction which may
`include down sampling, lossy compression, summarization or any means of data
`reduction as a novel means to speed up watermarking encode and decode operations.
`Essentially a lossy method for data reduction yields the best results for encode and
`
`eferenced herein.
`
`decode operations.
`It is desirable to have both copy control and forensic watermarks in the same
`signal to address the needs of the hardware, computer, and software industries while
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1409
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1409
`
`
`
`WO 00/57643
`
`“
`
`PCT/USOO/06522
`
`also providing for appropriate security to the owners of the copyrights. This will
`become clearer with further explanation of the sample embodiments discussed herein.
`The present invention also contemplates the use of data reduction for purposes
`of speedier and more tiered forms of security, including combinations of these methods
`with transfer function functions.
`In many applications,
`transfer functions (e.g.,
`scrambling), rather than mapping functions (e.g., watermarking), are preferable or can
`g. With “scrambling,” predetermined keys are
`those skilled
`
`be used in conjunction with mappin
`associated with transfer functions instead of mapping functions, although
`in the art may recognize that a transfer function is simply a subset of mask sets
`encompassing mapping functions.
`It
`is possible that tiered scrambling with data
`reduction or combinations of tiered data reduction with watermarking and scrambling
`
`may indeed increase overall security to many applications.
`The use of data reduction can improve the security of both scrambling and
`watermarking applications. All data reduction methods include coefficients which
`affect the reduction process. For example, when a digital signal with a time or space
`component is down sampled, the coefficient would be the ratio of the new sample rate
`to the original sample rate. Any coefficients that are used in the data reduction can be
`randomized using the key, or key pair, making the system more resistant to analysis.
`Association to a predetermined key or key pair and additional measure of security may
`include biometric devices, tamper proofing of any device utilizing the invention, or
`
`other security measures.
`
`Tests have shown that the use
`
`of data reduction in connection with digital
`
`watermarking schemes significantly reduces the time required to
`
`decode the
`
`watermarks, permitting increases in operational efficiency.
`Particular implementations of the present
`invention, which have yielded
`incredibly fast and inexpensive digital watermarking systems, will now be described.
`These systems may be easily adapted to consumer electronic devices, general purpose
`computers, sofiware and hardware. The exchange of predetermined keys or key pairs
`may facilitate a given level of security. Additionally, the complementary increase in
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1410
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1410
`
`
`
`WO 00/57643
`
`A
`
`PCT/USOO/06522
`
`security for those implementations where transfer functions are used to “scramble" data,
`
`is also disclosed.
`
`a more complete understanding of the invention and some advantages
`thereof, reference is now made to the following descriptions taken in connection with
`the accompanying drawings in which:
`FIG. 1 is a fiinctional block diagram that shows a signal processing system that
`generates “n” remainder signals and “n” data reduced signals.
`FIG. 2 is a functional block diagram for an embodiment of the present invention
`which illustrates the generation of an output signal comprised of a data—reduced,
`watermarked signal and a first remainder signal.
`FIG. 3 is a functional block diagram for an embodiment of the present invention
`neration of an output signal comprised of a data—reduced,
`
`which illustrates the ge
`
`watermarked signal and a wat
`
`errnarkcd, first remainder signal.
`
`FIG. 4 is a functional block diagr
`
`am for decoding the output signal generated
`
`by the system illustrated in FIG. 2.
`FIG. 5 is a functional block diagram for decoding the output signal generated
`
`by the system illustrated in FIG. 3.
`6 is a functional block diagram for an embodiment ofthe present invention
`FIG.
`which illustrates the generation of an output signal comprised of a data-reduced,
`scrambled signal and a first remainder signal.
`FIG. 7 is a functional block diagram for an embodiment of the present invention
`which illustrates the generation of an output signal comprised of a data-—reduccd,
`scrambled signal and a scrambled, first remainder signal.
`FIG. 8 is a functional block diagram for decoding the output signal generated
`
`by the system illustrated in FIG. 6.
`FIG. 9 is a functional block diagram for decoding the output signal generated
`
`by the system illustrated in FIG. 7.
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1411
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1411
`
`
`
`WO 00/57643
`
`“
`
`PCT/USOO/06522
`
`DETAILED DESCRIPTION
`The embodiments of the present
`understood by referring to the drawings,
`
`invention and its advantages are best
`like numerals being used for like and
`
`corresponding parts of the various drawings.
`
`An Overview
`A system for achieving multiple levels of data reduction is illustrated in FIG.
`I . An input signal 10 (for example, instructional text, executable binary computer code,
`images, audio, video, multimedia or even virtual reality imaging) is subjected to a first
`data reduction technique 100 to generate a first data reduced signal 20. First data
`reduced signal 20 is then subtracted from input signal 10 to generate a first remainder
`
`signal 30.
`First data reduced signal 20 is subjected to a second data reduction technique
`101 to generate a second data reduced signal 21. Second data reduced signal 21 is then
`subtracted from first data reduced signal 20 to generate a second remainder signal 31.
`Each of the successive data reduced signals is,
`in turn, subjected to data
`reduction techniques to generate a further data reduced signal, which,
`in turn,
`is
`subtracted from its respective parent signal to generate another remainder signal. This
`process is generically described as follows. An (n-l) data reduced signal 28 (Le, a
`signal that has been data reduced n—l times) is subjected to an nth data reduction
`technique 109 to generate an nth data reduced signal 29. The nth data reduced signal
`29 is then subtracted from the (n-l) data reduced signal 28 to produce an n‘“ remainder
`
`1 in
`An output signal can be generated from the system illustrated in FIG.
`numerous ways. For example, each of the n remainder signals (which, through
`represented by reference numerals 30-39, are not intended to be limited to 10 signals)
`and the 11‘“ data signal may optionally subjected to a watermarking technique, or even
`optionally subjected to a encryption technique, and each of the (n+1) signals (whether
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1412
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1412
`
`
`
`W0 (IO/57643
`
`A
`
`PCT/USUO/06522
`
`reduction
`
`watermarked or encrypted, or otherwise untouched) may then be added together to form
`an output signal. By way of more particular examples, each of the (n+1) signals (i.e.,
`the n remainder signals and the n‘“ data reduced signal) can be added together without
`any encryption or watermarking to form an output signal; or one or more of the (n+1)
`signals may
`gether; or one
`be watermarked and then all (n+1) signals may be added to
`gnals may be encrypted and then all (n+1) signals may be added
`or more of the (n+1) si
`It is anticipated that between these three extremes lie numerous hybrid
`together.
`combinations involving one or more encryptions and one or more watermarkings.
`Each level may be used to represent a particular data density. E.g., if the
`method is down—sampling, for a DVD audio signal the first row would
`led at 96 kHz, the second at 44.1 kHz., the third at 6 kHZ., etc.
`represent data samp
`There is only an issue of deciding what performance or security needs are contemplated
`when undertaking the data reduction process and choice of which types of keys or key
`pairs should be associated with the signal or data to be reduced. Further security can
`5, one time stamps or
`ased by including block ciphers, special one way function
`be incre
`evices in the software or hardware devices that can be em
`even biometric d
`Passwords or biometric data are able to assist in the determination of the identity ofthe
`user or owrier of the data, or some relevant identifying information.
`An example of a real world application is helpful here. Given the predominant
`y compression audio
`concern, at present, ofMPEG 1 Layer 3, or MP3, a perceptual loss
`data format, which has contributed to a dramatic re—evaluation of the distribution of
`music, a digital watermark system must be able to handle casual and more dedicated
`piracy in a consistent manner. The present invention contemplates compatibility with
`MP3, as well as any perceptual coding technique that is technically similar. One issue,
`” detect a watermark as quickly as possible
`is to enable a universal copy control “key
`t 96 kHz,
`from a huge range of perceptual quality measures. For instance, DVD 24 bi
`encoded watermarks, should be detected in at least “real time,” even after the signal has
`been down sampled, to say 12 kHz of the 96 kHz originally referenced. By delineating
`and starting with less data, since the data-reduced signal is obviously smaller though
`
`bodied.
`
`DISH-Blue Spike-842
`
`Exhibit 1004, Page 1413
`
`DISH-Blue Spike-842
`Exhibit 1004, Page 1413
`
`
`
`W0 (JO/57643
`
`‘
`
`10
`
`PCT/USOO/06522
`
`still related perceptually to the original DVD signal, dramatic increases in the speed and
`survival of the universal copy control bits can be achieved. The present invention also
`permits the ability to separate any other bits which may be associated with other more
`secure predetermined keys or key pairs.
`Where the data stream is executable computer code, the present invention
`contemplates breaking the code into objects or similar units of functionality and
`allowing for determination of what is functionally important. This may be more
`apparent to the developer or users of the software or related hardware device. Data
`reduction through the use of a subset of the functional objects related to the overall
`functionality of the software or executable code in hardware or microchips, increase the
`copyright protection or security sought, based on reducing the overall data to be
`associa