throbber
United States Patent
`Rhoads
`
`US005745604A
`[11] Patent Number:
`[45] Date of Patent:
`
`5,745,604
`Apr. 28, 1998
`
`[54]
`
`IDENTIFICATION/AUTHENTICATION
`SYSTEM USING ROBUST, DISTRIBUTED
`CODING
`
`OTHER PUBLICATIONS
`
`{75]
`
`Inventor: Geoffrey B. Rhoads. West Linn, Oreg.
`
`[73] Assignee: Digimarc Corporation, Portland, Oreg.
`
`.
`Szepanski. “A Signal Theoretic Method for Creating Forg-
`ery—Proof Documents for Automatic Verification.” Proceed-
`ings 1979 Carnahan Conference on Crime Countermeasures,
`May 16, 1979, pp. 101-109.
`Tanaka et al.. “A Visual Retrieval System with Private
`Information for Image Database,” Proceeding International
`Conference on DSP Applications and Technology, Oct.
`[21] Appl. No.: 614,521
`1991, 00. 415-421.
`.
`Sapwater
`et
`al.,
`“Electronic Copyright Protection.”
`[22] Filed:
`Mar. 15, 1996
`PHOTO>Electronic Imaging, vol. 37. No. 6, 1994, pp.
`Related U.S. Application Data
`16-21.
`[63] Continuation of Ser. No. 215,289, Mar. 17, 1994, aban-|JPEG Group’s JPEG Software (release 4), FTP.CSU-
`doned, which is a continuation-in-part of Ser. No. 154,866,
`A.BerekeleyEDU
`/PUB/Cypherpunks/Applications/
`Nov. 18, 1993, abandoned.
`ISTEG/JPEG.Announcement.GZ. Jun. 7, 1993, 2 pages.
`[51] Want, CHS aeecccecccssssessscseseseeee GO06K 9/36; HO4L 9/00
`—Caronni, “Assuring Ownership Rights for Digital Images.”
`[82] U.S. C1 onccccssssesecsceccncacenenee 382/232; 380/4; 380/5;
`Published in the Proceedings of ‘Reliable IT Systems.” VIS
`382/100
`°O5, HH. Briiggemann and W. Gerhardt-Hiackl
`(Ed.),
`[58] Field of Search w..sssccssssssuessesee 380/3, 6, 19,23,
` Vieweg Publishing Company. Germany, 1995, Jun. 14.
`380/26, 49, 54, 55, 4, 10, 51, 5; 379/95;
`1994, 10 pages.
`341/67; 283/73, 113, 83. 82; 116/18; 395/375;
`Koch et al., “Copyright Protection for Multimedia Data.”
`382/232, 100, 276, 112, 115, 135, 181;
`Proc. of the International Conference on Digital Media and
`381/124, 29, 181; 348/460
`Electronic Publishing, Dec. 6-8, 1994. Leeds, U.K.. 15
`pages.
`
`(56]
`
`3,493,674
`3,569,619
`3,585,290
`
`References Cited
`U.S. PATENT DOCUMENTS
`2/1970 Houghton ...ccsscsscsssesssesserseessee 173/5.6
`.. 1786.8
`3/1971 Simijian ......
`
`G/LOTE Samford .0.......esecesscsseceseeseeeene 178/5.6
`.
`.
`(List continued on next page.)
`FOREIGN PATENT DOCUMENTS
`es tor hoo Burner por or "uu. HO4B 1/66
`411 232
`2/1991 European Pat. Off.
`...... HO4N 1/41;
`441702
`8/1991 European Pat. Off.
`........ GIIB 20/00
`493091
`7/1992 European Pat. Off.
`....... HO4N 1/387
`551016 Al
`7/1993 European Pat. Off. .
`......... GO7D 7/00
`581 3172/1994 European Pat. Off.
`581317.A2
`2/1994 European Pat. Off... GO7F 70
`605 208 AZ
`7/1994 European Pat. Off. .
`
`(List continued on next page.)
`
`Primary Examiner—Leo Boudreau
`Assistant Examiner—Bhavesh Mechta
`Attorney, Agent, or Firm—Klarquist Sparkman Campbell
`Leigh & Whinston
`
`[57]
`
`ABSTRACT
`
`An identification code signal is impressed on a carrier to be
`identified (such as an electronic data signal or a physical
`medium) in a manner that permits the identification signal
`_later to bestatistically discerned and the carrier thereby
`identified. The method and apparatus are characterized by
`robustness despite degradation of the encoded carrier, and
`by holographic permeation of the identification signal
`throughout thecarrier.
`
`MAO FMS NOISE
`
`(List continued on next page.)
`14 Claims, 3 Drawing Sheets
`
`| OATAIN OF CREATE ORIGINALDIGITALS:GHALOAMAGE”
`OAGITAL S:GAALOF MAGE,
`
`———ESTIMATEROUGHOFFSET |

`CHOOSE NGA WAIT
`
`IRENTIRCATION WORD. £.¢ 32]
`GENERATE MBIT
`IDENTIFICATION WORD.
`
`GENERATE OASYNTHESIZE N"RANDOMINDEPENDENT
`SUGRMALSWITH ROUGHLYGAUSSIAN DISTRIBUTION
`ABQUTSOME MEAN VALUE, WHERE SIGNALS HAVE
`EQUAL EXTENT AND DIGITAL SPACING OF
`CARGHALDIGTAL BIONALOR IMAGE
`APPLY DIGITAL FILTER WHICH ATTENLATES
`BOTH LOWAND HIGH FREQUENCIES, LEAVING
`MADOLE-RUMGE FREQUENCIESLARGELY INTACT
`CONDENSE N RANDOM S1GNALS TOA LOWEST
`ACCEPTABLE BIT VALLE IF MAEARORY GF
`STORAGE SPACE 15AT A PREMIUM
`‘AODALLRANDOM IMAGES TOGETHER VRHICH HAWE
`‘A CORPESPONDING '1) IM THEDRASSOGATED
`BIT-PLACE-VALUE OF THE NvB(T IDENTIFICATIONWORD,
`CAGL THISTHE BASE COMPOSITE SIGNAL OF (MAGE
`EXPERIMENT VEOLRLLY WITH
`GAINAND GAbNA APPLIED
`TO BASE COMPOSITE SIGMAL CF IMAGE, ADO'NG THiSTD)
`‘OROGIHALDIGI“ALSIGMA. OR MIMIE, AND DETERMINING
`THE ACCEPTAGLE SERCEIVEDNOSE LEVEL,
`APPLY FOUNC GAB! AND GAMATOBABE COMPOSITE,
`ADD TO QAUGINAL, THEN CALL THIS
`THE DISTRIOUTABLE SIGNAL OR MAGE
`—__—___—_ a".
`‘STOREAWAY ANDSECURE OHGINAL S:G¥0AL OF IMAGE
`ALOHO WITHN-BIT IDERTIICATIONWORD AND:
`THEN RADONSIGNALS
`(_SELU OR DISTRIGUTE THE DISTRIBUTABLE SIGNAL OF IMAGE
`
`
`
`
`
`
`Sony Exhibit 1018
`Sony Exhibit 1018
`Sony v. MZ Audio
`Sony v. MZ Audio
`
`

`

`5,745,604
`
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`
`
`7/1990
`4,939,615
`7/1990
`4,941,150
`eeccesecesssenee 235/61.7
`4/1972 Yamamoto et AD,
`3,655,162
`7/1990
`4,943,973
`. 235/619 R
`11/1972 Philipson, Jr.
`.
`3,703,628
`7/1990
`4,943,916
`«. 340/146.3
`4/1974 Rothfjell
`........
`3,805,238
`7/1990
`4,944,036
`escssseesnee 348/450
`5/1974 Walker et al...
`3,809,806
`4,963,998 10/1990
`.............-.- 178/5.2R
`9/1974 Loughlin et all.
`3,838,444
`4,965,827 10/1990 McDonald .esssscossseseessensesen 380/25
`3,914,877 LO/LD7S Himes ....ccsssocrsesescassensaresesassseceescee 35/2
`. 358/142
`4,967,273 10/1990 Greenberg...
`
`11/1975 Ikegami et al.
`.
`«. 350/320
`3,922,074
`11/1990 O’Gradyet al.
`. 358/142
`4,969,041
`
`
`
` 7/1976 Maddoxetal. «« 348/473
`
`3,971,917
`.
`vase 380/3
`11/1990 Gross et al.
`4,972,471
`
`
`wees 178/56
`3,982,064
`9/1976 Bamaby ....
`11/1990 Nathans ......
`.. 380/23
`4,972,476
`
`3,984,624 10/1976 Waggener......
`wae 178/56
`4,979,210 12/1990 Nagata et al.
`......scecssecnscessesseeses 3380/3
`
`
`4,025,851
`5/1977 Haselwood et al.
`. 325/31
`2/1991 Piosenka .....
`4,993,068
`380/23
`4.225,967
`9/1980 Miwaetal.
`...
`. 455/68
`341/120
`4,996,530
`2/1991 Hilton.........
`
`4,230,990 10/1980 Lert, Jr. et al.
`woe 455/67
`4/1991 Schreiber et al.
`.
`soe 358/148
`5,010,405
`
`
`4231,113 10/1980 Blasbalg .....
`- 455/29
` G/L99L Soltesz oo...eseseecenesscnresneees 380/54
`5,027,401
`
`4,238,849 12/1980 Gassmamin ...cscssssecsoereccrsrencnecee 370/11
`. 370/125
`5,036,513
`7/1991 Greenblatt
`
`
`4,252,995
`2/1981 Schmidtet al.
`179/1 GD
`11/1991 Gibson........
`. 358/142
`5,063,446
`
`
`4/1981 Bright etal. ...
`.. 364/200
`4,262,329
` S75/L
`5,073,899 12/1991 Collier et al.
`
`1/1982 Maxemchuk...
`ww STOLL
`4,313,197
`5,075,773 12/1991 Pullen et al.
`358/141
`
`1/1983 Leventer et al.
`.. 358/147
`4,367,488
`5,077,608 12/1991 Dubner.....
`358/183
`
`4/1983 Warner...........
`179/1 GD
`4,379,947
`5,077,795 12/1991 Rourkeetal.
`380/55
`
`4/1983 Leventer et al.
`«+ 358/147
`4,380,027
`5,079,648
`1/1992 Mautfe ........00.
`. 360/31
`
`
`4,389,671
`6/1983 Fosnet ..........
`w. 358/124
`2/1992 Bloomberg et al.
`5,091,966
`382/21
`
`4,395,600
`7/1983 Lundy etal.
`+ 1791.5 M
`. 235/382
`3/1992 Miyata ............
`5,095,196
`
`4,423,415
`were 380/3
`5/1992 Best et al.....
`12/1983 Goldman ....
`. 340/825.34
`5,113,437
`
`
`
`4,425,642=1/1984 Moses et al. ..sscseccsccsscsresecerseenee 3775/1 5,128,525 7/1992 Stearns et al. . 935/454
`
`
`4,476,468 5,144,660—9/1992 Rose .......scsssscesesseasesansesanenenacveseres 380/410/1984 Goldman .... 340/825.034
`
`
`
`
`
`9/1992 Resnikoff et al.
`4,528,588
`«7/1985 Lifberg 0...
`esssesssececensrecenee 358/122
`5,148,498
`382/54
`.- 380/23
`9/1992 Elsner ......
`4,532,508
`7/1985 Ruell .......
`. 340/825.34
`5,150,409
`
`5,161,210 11/1992 Druyvesteyn et al
`wee 395/2
`4,547,804 10/1985 Greenberg
`wo» 398/142
`11/1992 Milheiser........
`340/825.54
`4,553,261
`11/1985 Froessel
`2.0...
`sceecceeereecneete 382/57
`5,166,676
`4,590,366
`5/1986 Rothfjell
`.
`ws 235/494
`5,168,146 12/1992 Bloomberg
`. 235/456
`4,595,950
`6/1986 Lofberg ...
`.. 358/122
`5,181,786
`1/1993 Hujink ........
`w=
`382/2
`4,637,051
`1/1987 Clark.......
`» 382/1
`5,185,736
`2/1993 Tyrrell et al.
`oe 370/55
`4,639,779
`1/1987 Greenberg ..
`we. 358/142
`5,199,081
`3/1993 Saito et al. oc
`ssscssnsesnsssnseenssane 382/2
`
`3/1987 Butler etal. ...
`.. 358/185
`4,647,974
`5,200,822
`4/1993 Bronfin et al.
`. 358/142
`3/1987 Labedz etal.
`wee 379/59
`4,654,867
`5,212,551
`5/1993 Conanan .....
`. 358/143
`
`
`4/1987 Dlugos ..........
`weve 380/23
`4,660,221
`5,213,337
`5/1993 Sherman ..
`. 273/439
`5/1987 Borror etal.
`..
`«. 235/487
`4,663,518
`5,228,056
`7/1993 Schilling .....
`375A
`
`
`5/1987 Cooper...........
`a» 358/145
`. 358/142
`4,665,431
`5,243,423
`9/1993 DelJean et al.
`6/1987 Hustig etal.
`..
`wee 370/76
`9/1993 Zhang o.n.ccecccsccsssssscoesessssetsees 235/454
`4,672,605
`$245,165
`
`6/1987 Tetrick et al. oo...ccscesseceseees 358/296
`340/825.31
`9/1993 Gokcebay...
`4,675,746
`5,245,329
`
`..
` 358/191.1
`4,677,435
`6/1987 Causse D’Agraives et al.
`. 340/825.31
`5,247,364
`9/1993 Banker et al.
`
`10/1993 Balkanski et al. ..
`wwe 358/426
`4,682,794
`7/1987 Margolin .
`. 283/82
`5,253,078
`......
`. 358/438
`4,703,476 10/1987 Howard .......cccsssscesscosrenenseanoore 370/76
`5,257,119 10/1993 Funada et al.
`
`.
`w« 380/23
`4,712,103 12/1987 Gotanda ..
`~ 340/825.31
`5,259,025
`11/1993 Monroe et al.
`
`
`
`
`
`
`4,718,106 1/1988 Weimblatt2...sccccssecsecssecsessaee 455/2 5,267,334 11/1993 Normille et al. ... . 382/56
`1/1994 Sugiyama et al.
`..
`. 375/1
`4,739,377
`4/1988 Allen .......
`... 355/133
`5,280,537
`
`........
`4,750,173
`6/1988 Bliithgen....
`a» S7TO/111
`5,293,399
`3/1994 Hefti
`375/7
`al.
`. 382/56
`3/1994 Krause et
`4,765,656
`8/1988 Becker et al.
`we 283/70
`5,295,203
`
`3/1994 Pack et al.
`...
`358/261 .3
`4,775,901
`10/1988 Nakano......
`a 360/60
`5,299,019
`
`4/1994 Butera ..
`a». 382/56
`4,776,013 10/1988 Kafr etal.
`.
`wee 380/54
`5,305,400
`
`5/1994 Tow ........
`235/494
`4,805,020
`2/1989 Greenberg ......
`.» 358/147
`5,315,098
`6/1994 Copriviza et al.
`..
`. 348/46
`4,807,031
`2/1989 Broughtonet al.
`- 358/142
`5,319,453
`
`6/1994 Blonstein et al.
`..
`382/56
`4,811,357
`3/1989 Betts et al......
`« SIA
`5,319,724
`395/2.14
`4,811,408
`3/1989 Goldman .
`wo. 382/2
`5,319,735
`6/1994 Preuss etal.
`...
`4,820,912
`4/1989 Samyn ..
`aw» 235/449
`5,325,167
`6/1994
`4,835,517
`5/1989 van der Grachtet al.
`340/310 A
`5,327,237
`7/1994
`4,855,827
`8/1989 Best
`........
`.-- 358/143
`§,337,362
`8/1994
`
`al.
`4,864,618
`9/1989 Weight et
`see 380/51
`5,349,655
`9/1994
`
`4,866,771—Q/1989 Baim cescsssccsrecssceccsensresseessoecesare 380/23 5,351,302 9/1994
`
`4,874,936 10/1989 Chandler etal.
`.. 358/450
`5,379,345
`1/1995
`4,876,617 10/1989 Bestet al. ..........
`+. 360/60
`5,387,941
`2/1995
`
`11/1989 Leighton et al.
`..
`. 380/23
`4,879,747
`5,394,274
`2/1995 Kahn
`
`11/1989 Pommier........
`... 358/142
`4,884,139
`5,396,559
`3/1995
`4,885,632 12/1989 Mabeyet al.
`we 358/84
`5,398,283
`3/1995
`4,903,301
`2/1990 Kondoetal........
`. 3810
`5,404,160
`4/1995
`
`4,908,836
`3/1990 Rushforth et al.
`.
`. 341/51
`5,404,377
`4/1995
`4,908,873
`3/1990 Philibert et al.
`...
`. 382/34
`5,408,542
`4/1995
`4/1990 Cook ........000.
`4,920,503
`364/521
`5,418,853
`5/1995
`
`5/1990 Shiang et al.
`......ccomseesrceneenente 283/87
`4,921,278
`5,422,963
`6/1995
`
`
`
`.
`
`
`
`.
`
`
`
`
`
`
`
`
`
`

`

`,
`
`LivA
`
`os
`
`oo
`
`..
`
`”
`
`5,745,604
` Page 3
`
`W095/20291
`WO 9626494
`WO 9627259
`
`7/1995 WIPO.
`8/1996 WIPO.
`9/1996 WIPO.
`
`6/1995 Aoki et ab. cccessen 395/162
`§,422,995
`
`6/1995 Thomas etal.
`ww 380/20
`5,425,100
`6/1995 Moskowitz ....
`370/60
`5,428,606
`6/1995 Hiller etal.
`...
`370/60.1
`5,428,607
`
`
`OTHER PUBLICATIONS
`7/1995 Thibadeaw et ab.
`....ssssesesereesnee 348/6
`5,432,542
`“Access Control and COpyright Protection for Images,
`7/1995 Schwartz .......
`382/232
`3,432,870
`a
`8/1995 Leslie ..
`235/487
`5,446,273
`WorkPackage 8: Watermarking.
`Jun. 30, 1995. 46 pages.
`9/1995 Keene .
`348/1
`5,450,122
`“Access Control and COpyright Protection for Images.
`9/1995 Jensen ett al.
`sassssessssssssssessnesssen 3806
`5,450,490
`
`WorkPackage 3: Evaluation of Existing Systems,” Apr. 19,
`5,461,426 10/1995 Limberg etal.
`348/475
`1995, 68 pages.
`5,469,506 11/1995 Berson......
`380/23
`Boneh,“Collusion-Secure Fingerprinting for Digital Data.”
`5,473,631
`12/1995 Moses.......
`375/202
`
`Department of Computer Science. Princeton University,
`5,479,168 12/1995 Johnsonet al.
`341/110
`
`-4995, 31 pages.
`...
`on 348/1
`1/1996 Thomas et al.
`5,481,294
`Burgett et al.. “A Novel Method for Copyright Labeling
`» 380/54
`1/1996 Shamir......
`5,488,664
`sare
`”
`.
`vere 380/10
`5,499,294
`3/1996 Friedman
`
`Digitized Image Data,”
`requested by e-mail from author
`5.515.081
`5/1996 Vasilik
`345/189
`
`5,524,933 -» 283/67~~“(unavailable/password protected on IGD WWW site);6/1996 Kuntet al......
`
`
`6/1996 Braudawayet al.
`w. 380/54
`5,530,759
`received Sep. 18, 1995, 12 pages.
`7/1996 Hartick etal. ...
`364/419.1
`5,532,920
`Friedman, “The Trustworthy Digital Camera: Restoring
`$,537,223
`7/1996 Curry...
`.» 358/460
`Credibility to the Photographic Image.” IEEE Transactions
`5,539,471
`7/1996 Myhrvold etal. .
`-- 348/473
`on Consumer Electronics. vol. 39, No. 4, Nov.. 1993. pp.
`5,539,735
`7/1996 Moskowitz ....
`... 37060-95910.
`
`
`
`“Cyphertech Systems: Introduces Digital Encoding Device
`. ate
`Sisal7a auieee éfams et al
`. Prevent TV Piracy,” Hollywood Reporter, Oct. 20, 1993.
`” 3go/119
`5544255
`8/1996 Smithies et al
`n
`Dp:
`:
`4
`rat
`8/1996 Aziz et al
`5,548,646
`we 380/23
`
`5,557,333 9/1996 Fungo et ab. ccsscsseeecsneesnsnee 349/473|“NAB—Cyphertech Starts Anti-Piracy Broadcast Tests.
`
`scssssssessenersnnssee 349/432
`5,559,559
`9/1996 Jungoet al.
`Newsbytes, NEW03230023, Mar. 23, 1994.
`
`.....ecseccccecsoneesnsenesees 348/6
`5,568,179 10/1996 Dich! et al.
`Humphrey, “Stamping Out Crime,” Hollywood Reporter,
`5,568,570 10/1996 Rabbani
`....
`382/238
`Jan. 26, 1994, p. S48.
`
`
`235/494
`5,572,010 11/1996 Petrie .....
`Kochetal., “Towards Robust and Hidden Image Copyright
`11/1996 Montgomery etal.
`5,572,247
`348/10
`Labeling,” Proc. of 1995 IEEE Workshop on Nonlinear
`oe8e 11/1996 Hecht srtterneeeasanee
`235/494
`Signal and Image Processing, Jun. 20-22, 1995, 4 pages.
`
`379,124 11/1996 Aijala et al.
`...
`386/96
`“Copyright Protection for Digital Images, Digital Finger-
`....
`5,582,103 12/1996 Tanaka et al.
`101/32
`we
`*
`or
`
`printing from FBI,” Highwater FBI brochure. 1995. 4 pages.
`
`5,587,743 12/1996 Montgomery et
`348/473
`“High W.
`FBI
`Limited
`:
`C
`oh
`....
`gh Water
`FBI Limited Presentation Image
`Copyright
`5,590,197 12/1996 Chenet al.
`380/24
`5,602,920
`2/1997 Bestler et al.
`.
`380/49
`Protection Software,” FBI Ltd brochure, Jul., 1995, 17
`
`
`~ 380/4
`5,606,609
`2/1997 Houser et al.
`.
`pages.
`3/1997 Pettic «seen
`. 283/67
`5,611,575
`Boland et al, “Watermarking Digital Images for Copyright
`5,613,004
`3/1997 Cooperman et al
`» 380/28
`Protection,” Fifth International Conference on Image Pro-
`5,613,012
`3/1997 Hoffman etal
`~ 382/115
`cessing and its Applications, Conference Date 4-6 Jul. 1995.
`
`jee 3/1997 Cobbley et al.
`..
`~~ 3487
`Conf. Publ. No. 410, pp. 326-330.
`4/1997 Montgomery .....
`» 348/473
`5,617,148
`“Steganography,” Intellectual Property and the National
`........
`358/261.1
`5,629,770
`5/1997 Brassil
`:
`.
`
`Information Infrastructure The Report ofthe Working Group
`wee 380/4
`5,629,980
`5/1997 Stefik et al.
`:
`«3580/4
`6/1997 Stefik et al.
`on Intellectual Property Rights, Sep. 1995, pp. 212-213.
`5,638,443
`
`. 380/25
`5,638,446
`6/1997 Rubin .....
`Caruso, “Digital Commerce, 2 plans for watermarks, which
`
`7/1997 Barton ........snsesee
`.- 380/23
`5,646,997
`can bind proof of authorship to electronic works.” New York
`5,659,726
`8/1997 Sandford, II et al.
`- 395/612
`Times, Aug. 7, 1995, one page.
`
`8/1997 Kawana ...........
`. 358/501
`5,661,574
`“Holographic signatures for digital images,” The Seybold
`
`-. 380/54
`5,664,018
`9/1997 Leightonetal. .
`Report on Desktop Publishing, Aug. 1995, one page.
`9/1997 Goodman et al. wo.395/200.76
`5,666,487
`Clarke,“Invisible Code Tags Electronic Images.” Electronic
`FOREIGN PATENT DOCUMENTS
`Engineering Times, Jun. 12, 1995, n. 852, p. 42.
`“The Copyright Can of Worms Opened Up By The New
`eaoonOA 411998 European Pa On serene GO6K 15A02
`Electronic
`Media.”
`Computergram
`_—_Internations,
`uropean Vat.
`Ou.
`.
`pCGN07170006, Jul. 17, 1995 and The Copyright Can of
`650 146 Ai
`4/1995 European Pat. Off.
`.
`A
`:
`705.0252
`4/1996 European Pat. Off.
`.
`Worms Opened Up By the New Electronic Media—2,
`9/1989 Germany.........
`.. HO4B 1/66
`3806411
`Computergram Internations, pCGN07210008. Jul. 21, 1995,
`
`4-248771 . HO4N 1/44=3 pages.9/1992 Japan ...
`
`
`
`
`5-242217—Q/N993 Japan ...cesssesscasseanesssenseses GO6F 15/62 “Access Control and COpyright Protection for Images,
`
`8-30759
`2/1996 Japan.
`WorkPackage 1: Access Control and Copyright Protection
`2063018
`5/1981 United Kingdom .
`for Images Need Evaluation,” Jun., 1995, 21 pages.
`7/1981 United Kingdom ........... HON 7/16
`2.067 871
`“access Control and COpyright Protection for Images.
`
`.. GLB 2008
`2196167
`4/1988 United Kingdom
`Conditi
`.
`.
`:
`:
`‘onditional Access and Copyright Protection Based on the
`11/1988 United Kingdom ............ G11B 23/28
`2 204 984
`U
`£T
`d Third Parties.” 1995. 43
`WO89/08915 +17pages.9/1989 WIPO. se of Trustes arties,
`
`
`
`
`
`WO 93725038
`12/1993 WIPO.
`Luc, “Analysis of Spread Spectrum System Parameters for
`WO95/10835
`4/1995 WIPO.
`Design of Hidden Transmission.” Radioengineering, vol. 4,
`WO95/14289
`5/1995 WIPO.
`No. 2, Jun. 1995, pp. 26-29.
`
`

`

`5,745,604
`Page 4
`
`Macq,“Cryptology for Digital TV Broadcasting.” Proceed-
`ings of the IEEE, vol. 83. No. 6, Jun. 1995, pp. 944-957.
`Zhao et al., “Embedding Robust Labels Into Images for
`Copyright Protection,” Proc. of the International Congress
`on Intellectual Property Rightsfor Specialized information,
`Knowledge and New Technologies (Vienna, Austria) Aug.
`21-25, 1995, 10 pages.
`Frequently Asked Questions About Digimarc Signature
`Technology, Aug. 1, 1995, HTTP:s//WWW.DIGIMARC-
`.COM,9 pages.
`Bender et al, “Techniques for Data Hiding.” Draft Preprint,
`Private Correspondence, dated Oct. 30, 1995.
`Johhnson, “Steganography,” Dec. 10, 1995, 32 pages.
`Aura. “Invisible Communication,” Helskinki University of
`Technology, Digital Systems Laboratory, Nov. 5, 1995, 13
`pages.
`Cox et al., “Secure Spread Spectrum Watermarking for
`Multimedia,” NEC Research Institute Technical Report,
`Dec. 5, 1995, 33 pages.
`Digimarc presentation at RSA Conference. approximately
`Jan. 17, 1996, 4 pages.
`Hecht, “Embedded Data Glyph Technology for Hardcopy
`Digital Documents,” SPIE vol. 2171, Feb. 1994, pp.
`341-352.
`Roberts, “Picture Coding Using Pseudorandom Noise,” IRE
`Trans. on Information Theory, vol. 8, No. 2, Feb., 1962, pp.
`145-154.
`
`Choudhury, et al, “Copyright Protection for Electronic
`Publishing over Computer Networks,” /EEE Network
`Magazine, Jun. 1994, 18 pages.
`Moller, et al., “Rechnergestutzte Steganographie: Wie sie
`Funktioniert und warum folglich jede Reglementierung von
`Verschiusselung unsinnig ist,” DuD, Datenschutz und Dat-
`ensicherung, 18/6 (1994) 318-326.
`Pennebaker et al., JPEG Stilt Image Data Compression
`Standard, Chapter 3, “Aspects of the Human Visual Sys-
`tem,” pp. 23-27, 1993, Van Nostrand Reinhold, New York.
`Castroetal., “Registration ofTranslated and Rotated Images
`Using Finite Fourier Transforms,” [EEE Transactions on
`Pattern Analysis and Machine intelligence, vol. PAMI-9,
`No. 5, Sep. 1987, pp. 700-703.
`Weberet al., “Correlative Image Registration,” Seminars in
`Nuclear Medicine, vol. XXIV, No. 4, Oct., 1994, pp.
`311-323.
`Toga et al., “Registration Revisited,” Journal of Neuro-
`science Methods, 48 (1993), pp. 1-13.
`Sheng et al., “Experiments on Pattern Recognition Using
`Invariant Fourier-Mellin Descriptors,” fourmal of Optical
`Society ofAmerica, vol. 3, No. 6, Jun., 1986, pp. 771-776.
`Kurak et al., “A Cautionary Note On Image Downgrading,”
`1992 IEEE, pp. 153-159.
`Wagner, “Fingerprinting,” 1983 IEEE, pp. 18-22.
`Sandford I, et al., “The Data Embedding Method,” SPIE
`vol. 2615, Oct. 23, 1995, pp. 226-259.
`Brassil et al., “Hiding Information in Document Images,”
`Nov., 1995. 7 pages.
`Pitas et al., “Applying Signatures on Digital Images.” TEEE
`Workshop on Nonlinear Image and Signal Processing, Neos
`Marmaras. Greece. pp. 460-463. Jun., 1995.
`Koch et al., “Digital Copyright Labeling: Providing Evi-
`dence of Misuse and Tracking Unauthorized Distribution of
`Copyrighted Materials.” OASIS Magazine. Dec. 1995, 3
`pages.
`
`Rindfrey. “Towards an Equitable System for Access Control
`and Copyright Protection in Broadcast Image Services: The
`Equicrypt Approach,” intellectual Property Rights and New
`Technologies, Proc. of the Conference, R. Oldenbourg Ver-
`lag Wien Miinchen 1995, 12 pages.
`Delaigle et al., “Digital Watermarking.” Proc. SPIE—Int.
`Soc. Opt. Eng.. vol. 2659, pp. 99-110, 1996.
`Dautzenberg,
`“Watermarking Images.” Department of
`Microelectronics and Electrical Engineering, Trinity Col-
`lege Dublin, 47 pages, Oct. 1994.
`Boucqueau et al., Equitable Conditional Access and Copy-
`right Protection for Image Based on Trusted Third Parties.
`Teleservices & Multimedia Communications, 2nd Int. Cost
`237 Workshop, Second International COST 237 Workshop,
`Nov., 1995; published 1996, pp. 229-243.
`New Product Information, “FBI at AppleExpo” (Olympia.
`London), Nov., 1995. 2 pages.
`ORuanaidh et al, “Watermarking Digital Images for Copy-
`right Protection,” http://www.kalman.mee.ted.ie/people/jjr/
`eva_pap.html, Feb. 2, 1996, 8 pages.
`DICE Digital Watermark System, Q&A. Dec., 1995, 12
`pages.
`Ohnishi et al., Embedding a Seal into a Picture Under
`Orthogonal Wavelet Transform, Proceedings of Multimedia
`°96, 1996, IEEE, pp. 514-521.
`Boney et al., “Digital Watermarks for Audio Signals,”
`Proceedings of Multimedia "96, 1996 IEEE, pp. 473-480.
`Arazi, et al., “Intuition, Perception, and Secure Communi-
`cation,” IEEE Transactionson Systems, Man, and Cybernet-
`ics, vol. 19, No. 5, Sep/Oct. 1989, pp. 1016-1020.
`van Schyndel etal., “Towards a Robust Digital Watermark.”
`ACCV '95, vol. 2, Dec., 1995, pp. 504-508.
`Bruyndonckx etal., “Spatial Method for Copyright Labeling
`of Digital Images,” 1994, 6 pages.
`“Watermarking & Digital Signature: Protect Your Work!”
`_ Published on Internet 1996, http://ltswww.epfl.ch/~jordan/
`watermarkinghtml.
`Gabor, et al., “Theory of Communication,” J. Inst. Elect.
`Eng. 93, 1946, pp. 429-441.
`Bruyndonckx et al., Neural Network Post-Processing of
`Coded Images Using Perceptual Masking. 1994, 3 pages.
`Pickholtz et al., “Theory of Spread-Spectrum Communica-
`tions—A Tutorial,” Transactions on Communications, vol.
`COM-30, No. 5, May, 1982, pp. 855-884.
`Sklar, “A Structured Overview of Digital Communica-
`tions—a Tutorial Review—Part 1,” IEEE Communications
`Magazine, Aug., 1983, pp. 1-17.
`Sklar, “A Structured Overview of Digital Communica-
`tions—a Tutorial Review—Part IT.” IEEE Communications
`Magazine, Oct., 1983. pp. 6-21.
`Tirkel et al.. “A Two-Dimensional Digital Watermark.”
`1995, 6 pages.
`Delaigle etal., “A Psychovisual Approach for Digital Picture.
`Watermarking,” 1995, 20 pages.
`Fimmerstad, “The Virtual Art Museum,” Ericsson Connex-
`ion, Dec., 1995, pp. 29-31.
`Mintzer et al., “Toward on-line, Worldwide Accessto Vati-
`can Library Materials,” IBM J. Res. Develop. vol. 40 No.2.
`Mar., 1996, pp. 139-162.
`Hartung et al., Digital Watermarking of Raw and Com-
`pressed Video, 1996, 9 pages.
`Cox et al, “A Secure, Imperceptable Yet Perceptually
`Salient, Spread Spectrum Watermark for Multimedia.”
`IEEE,Southcon/96, Conference Record, pp. 192-197, 1996.
`
`

`

`5,745,604
`Page 5
`
`Nakamuraet al.. “A Unified Coding Method of Image and
`Text Data Using Discrete Orthogonal Transform.” Systems
`and Computers in Japan, vol. 21, No. 3. 1990, pp. 87-92.
`Simmons, “Subliminal Channels; Past and Present,” ETT,
`vol. 5, No. 4, Jul-Aug. 1994, pp. 45-59.
`Nakamura et al, “A Unified Coding Method of Dithered
`Image and Text Data Using Micropatterns,” Electronics and
`Communications in Japan, Part 1, vol. 72, No. 4, 1989, pp.
`50-56.
`Tanaka, “Embedding the Attribute Information Into a Dith-
`ered Image,” Systems and Computers in Japan, vol. 21, No.
`7, 1990, pp. 43-50.
`Short, “Steps Toward Unmasking Secure Communications.”
`International Journal of Bifurcation and Chaos, vol. 4, No.
`4, 1994, pp. 959-977.
`Schreiberet al.. “A Compatibie High—Definition Television
`System Using the Noise-Margin Method of Hiding
`EnhancementInformation.” SMPTE Journal, Dec. 1989.pp.
`873-879.
`Tanaka etal., “New Integrated Coding Schemes for Com-
`puter—Aided Facsimile,” Proc. IEEE Int'l Conf. on Sys.
`Integration, Apr. 1990, pp. 275-281.
`Tanaka et al., “Embedding Secret Information Into a Dith-
`ered Multi-Level Image.” Proc.
`IEEE Military Comm.
`Conf., Sep. 1990, pp. 216-220.
`Matsui et al., “Video—Steganography: How to Secretly
`Embed a Signature in a Picture,” IMA Intellectual Property
`Project Proceedings, Jan. 1994, vol. 1, Issue 1, pp. 187-205.
`van Schyndel et al., “A Digital Watermark,” JEEE Interna-
`tional Conference on Image Processing, Nov. 13-16, 1994,
`pp. 86-90.
`Fitzgerald, “Invisible Digital Copyright ID.” Editor & Pub-
`lisher, Jun, 25, 1994, p. 62.
`“Foiling Card Forgers with Magnetic ‘Noise,’” Wail Street
`Journal, Feb. 8, 1994,
`Wise, “The History of Copyright, Photographers’ Rights
`Span Three Centuries,” PHOTO>Electronic Imaging, vol.
`37, No. 6, 1994.
`Kassam, Signal Detection in Non—Gaussian Noise, Dowden
`& Culver, 1988, 96 pages.
`
`Brassil et al., Electronic Marking and Identification Tech-
`niques to Discourage Document Copying, Proceedings of
`INFOCOM ’94 Conference on Computer, IEEE Commun.
`Soc Conference, Jan. 12-16. 1994, pp. 1278-1287.
`Jain, “Image Coding Via a Nearest Neighbors Image
`Model.” IEEE Transactions on Communications, vol.
`COM-23, No. 3, Mar. 1975. pp. 318-331.
`Arthur, “Digital Fingerprints Protect Artwork.” New Scien-
`tist, Nov. 12, 1994, p. 24.
`Matthews, “When Seeing is Not Believing.” New Scientist,
`Oct. 16, 1993, pp. 13-15.
`Bender et al., “Techniques for Data Hiding.” Massachusetts
`Institute of Technology, Media Laboratory, Jan. 1995, 10
`pages.
`Walton, “Image Authentication for a Slippery New Age.” Dr.
`Dobb’s Journal, Apr. 1995, pp. 18-26. 82-87.
`Port, “Halting Highway Robbery on the Internet.” Business
`Week, Oct. 17, 1994, p. 212.
`Machado. R.. “Announcing Stego 1.0a2, The First Stegan-
`ography Tool for the Macintosh.” Noy. 28. 1993.
`Arachelian, Ray, White Noise Storm (text of computer file
`WNSTORM.DOC), Apr. 11. 1994.
`Brown, Andy, S-Tools for Windows (text of computer file
`MANUAL.TXT), Mar. 6, 1994.
`Shaggy @phantom.com, “Hide and Seek v. 4.0” (text of
`computer file HIDESEEK.DOC), Apr. 10, 1994.
`Komatsu et al., A Proposal on Digital Watermark in Docu-
`ment Image Communication and Its Application to Realiz-
`ing a Signature, ISSN, Electronics and Communications in
`Japan, Part 1, vol. 73, No. 5, 1990, pp. 22-32.
`Schneier, Cryptographic Algorithms Can Create Nonforge-
`able Signatures for Electronic Documents, making Them
`Valid Legal Instruments, Byte, Nov., 1993, pp. 309-312.
`Komatsu et al., “Authentication System Using Concealed
`Image in Telematics,” Memoirs of the School of Science &
`Engineering, Waseda Univ.. No. 52. 1988. pp. 45-60.
`Tirkel et al, “Electronic Water Mark.” DICTA~93, Macqua-
`rie University, Sydney, Australia, Dec.. 1993, pp. 666-673.
`
`

`

`U.S. Patent
`
`Apr. 28, 1998
`
`Sheet 1 of 3
`
`5,745,604
`
`FIG. 4
`
`FIG. 1
`
`COMPUTER
`
`106
`
`104
`
`100
`
`——> EXPOSE AND STEP
`
`DIGITAL
`NUMBER
`(SIGNAL
`LEVEL)
`
`iG°:TTllTENtPorth©
` ~n—ax
`woOo
`zCCH&
`
`THU5
`
`HS
`
`.
`SAMPLE NUMBER(INDEX)
`
`
`
`
`

`

`U.S. Patent
`
`Apr. 28, 1998
`
`Sheet 2 of 3
`
`5,745,604
`
`FIG. 2
`
`OBTAIN OR CREATE ORIGINAL
`DIGITAL SIGNAL OR IMAGE
`
`ESTIMATE ROUGH OFFSET
`AND RMS NOISE
`
`CHOOSE N OR N-BIT
`IDENTIFICATION WORD,E.G. 32
`
`
`
`
`
`
`
`
`
`GENERATE OR SYNTHESIZE N "RANDOM® INDEPENDENT
`SIGNALS WITH ROUGHLY GAUSSIAN DISTRIBUTION
`ABOUT SOME MEAN VALUE, WHERE SIGNALS HAVE
`
`
`EQUAL EXTENT AND DIGITAL SPACING OF
`ORIGINAL DIGITAL SIGNAL OR IMAGE
`
`
`
`APPLY DIGITAL FILTER WHICH ATTENUATES
`
`
`BOTH LOW AND HIGH FREQUENCIES, LEAVING
`MIDDLE-RANGE FREQUENCIES LARGELYINTACT
`
`
`
`CONDENSE N RANDOM SIGNALS TO A LOWEST
`ACCEPTABLE BIT VALUE IF MEMORY OR
`
`STORAGE SPACE IS AT A PREMIUM
`
`
`ADD ALL RANDOM IMAGES TOGETHER WHICH HAVE
`A CORRESPONDING '1' IN THEIR ASSOCIATED
`
`
`BIT-PLACE-VALUE OF THE N-BIT IDENTIFICATION WORD,
`CALL THIS THE BASE COMPOSITE SIGNAL OR IMAGE
`
`
`
`EXPERIMENT VISUALLY WITH GAIN AND GAMMA APPLIED
`
`
`TO BASE COMPOSITE SIGNAL OR IMAGE, ADDING THIS TO
`ORIGINAL DIGITAL SIGNAL OR IMAGE, AND DETERMINING
`THE ACCEPTABLE PERCEIVED NOISE LEVEL
`
`
`
`APPLY FOUND GAIN AND GAMMA TO BASE COMPOSITE,
`ADD TO ORIGINAL, THEN CALL THIS
`THE DISTRIBUTABLE SIGNAL OR IMAGE
`
`
`
`
`
`STORE AWAY AND SECURE ORIGINAL SIGNAL OR IMAGE,
`ALONG WITH N-BIT IDENTIFICATION WORD AND
`
`
`THEN RANDOM SIGNALS
`
`
`SELL OR DISTRIBUTE THE DISTRIBUTABLE SIGNAL OR IMAGE
`
`GENERATE N-BIT
`IDENTIFICATION WORD
`
`
`
`
`
`

`

`U.S. Patent
`
`Apr. 28, 1998
`
`Sheet 3 of 3
`
`5,745,604
`
`FIG. 3|OBTAIN DIGITAL OR NON-DIGITAL COPY
`OF SUSPECT SIGNAL OR IMAGE
`
`DIGITIZE IF NOT ALREADY DIGITAL
`
`
`CUT AND MASK PORTION OF SIGNAL OR IMAGE
`BELIEVED TO BE SUSPECT
`
`
`(ONLYIF ENTIRE SIGNAL OR IMAGE 1S NOT SUSPECT)
`
`
`
`
`
`PROCUREORIGINAL DIGITAL SIGNAL OR
`IMAGE AND CUT AND MASK TO ROUGHLY
`
`
`THE SAME LOCATION OR SEQUENCE
`
`
`
`_ VISUALLY RESCALE AND REGISTER THE CUT-OUT
`SUSPECT SIGNAL TO THE CUT-OUT ORIGINAL SIGNAL
`
`RUN THROUGH SEARCH PROGRAMWITH MEAN
`SQUARED ERRORAS CRITERIA AND X OFFSET, Y OFFSET,
`AND SCALE AS THE THREE VARIABLES
`
`
`
`
`
`
`
`
`
`
`APPLY X OFFSET, Y OFFSET, AND SCALE TO CUT-OUT SUSPECT,
`THEN RESAMPLE ONTO EXACT GRID AND CUT-OUT
`
` OF ORIGINAL SIGNAL
`
`
`RUN THROUGH SEARCH PROGRAM WITH MEAN
`
`
`SQUARED ERROR AS CRITERIA AND DC OFFSET, GAIN, AND
`GAMMA AS THE THREE VARIABLES; APPLY TO SUSPECT
`
`
`
`SUBTRACT ORIGINAL FROM SUSPECT,
`GIVING DIFFERENCE SIGNAL OR IMAGE
`
`
`
`STEP THROUGH ALL N RANDOM INDEPENDENTSIGNALS, MASKED
`AS ORIGINAL AND CROSS-CORRELATEDWITH DIFFERENCE SIGNAL
`
`
`IN IMMEDIATE NEIGHBORHOOD OF REGISTRATION POINTS
`
`FIND 0 AND 1 LEVEL BY AVERAGING FIRST FOUR 0101 CODE VALUES
`
`ASSIGN EITHER AO OR A 1 TO EACH CROSS-CORRELATION RESULT|
`DEPENDING ON PROXIMITY TO THE AVERAGES OF PREVIOUS STEP|
`
`CHECK RESULT AGAINST SECURED IDENTIFICATION NUMBER
`
`PROSECUTEIF IT MATCHES? OR AT LEAST SEND
`A NASTY LETTER DEMANDING RECOMPENSE
`
`

`

`1
`IDENTIFICATION/AUTHENTICATION
`SYSTEM USING ROBUST, DISTRIBUTED
`CODING
`
`RELATED APPLICATION DATA
`
`This application is a continuation of application Ser. No.
`08/215.289, filed Mar. 17, 1994, which is a continuation-
`in-part of application Ser. No. 08/154,.866, filed Nov. 18,
`1993, both now abandoned.
`
`FIELD OF THE INVENTION
`
`The present invention relates to the embedding of robust
`identification codes in electronic, optical and physical
`media, and the subsequent, objective discernment of such
`codes for identification purposes even after intervening
`distortion or corruption of the media.
`The invention is illustrated with reference to a few
`exemplary applications, including electronic imagery, emul-
`sion film, and paper currency, but is not so limited.
`
`BACKGROUND AND SUMMARY OF THE
`INVENTION
`
`“I would never put it in the power of any printer or
`publisher to suppressoralter a work of mine, by making him
`master of the copy” ThomasPaine, Rights of Man, 1792.
`“The printer dares not go beyond his licensed copy”
`Milton, Aeropagetica, 1644.
`Since time immemorial, unauthorized use and outright
`piracy of audio and visual source material has caused lost
`revenues to the owners of such material, and has been a
`source of confusion and corruption of original work.
`With the advent of digitizing data audio signals and
`images, the technology of copying materials and redistrib-
`uting them in an unauthorized manner has reached new
`heights of sophistication, and more importantly, omnipres-
`ence. Lacking objective means for comparing an alleged
`copy of material with the original, owners and possible
`litigation proceedings are left with a subjective opinion of
`whether the alleged copy is stolen, or has been used in an
`unauthorized manner. Furthermore, there is no simple means
`of tracing a path to an original purchaser of the material,
`something which can be valuable in tracing where a possible
`“leak” of the material first occurred.
`
`A variety of methods for protecting commercial material
`have been attempted. One is to scramble signals via an
`encoding method priorto distribution, and descramble prior
`to use. This technique, however, requires that both the
`original and later descrambled signals never leave closed
`and controlled networks,
`lest
`they be intercepted and
`recorded. Furthermore, this arrangementis oflittle use in the
`broad field of mass marketing audio and visual material,
`where even a few dollars extra cost causes a major reduction
`in market, and where the signal must eventually be
`descrambied to be perceived and thus can be easily recorded.
`Another class of techniques relies on modification of
`source audio or video signals to include a subliminal iden-
`tification signal, which can be sensed by electronic means.
`-Examples of such systems are found in U.S. Pat. No.
`4,972,471 and European patent publication EP 441,702, as
`well as in Komatsu et al, “Authentication System Using
`Concealed. Image in Telematics,” Memoirs of the School of
`Science & Engineering, Waseda University, N

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket