`Rhoads
`
`US005745604A
`[11] Patent Number:
`[45] Date of Patent:
`
`5,745,604
`Apr. 28, 1998
`
`[54]
`
`IDENTIFICATION/AUTHENTICATION
`SYSTEM USING ROBUST, DISTRIBUTED
`CODING
`
`OTHER PUBLICATIONS
`
`{75]
`
`Inventor: Geoffrey B. Rhoads. West Linn, Oreg.
`
`[73] Assignee: Digimarc Corporation, Portland, Oreg.
`
`.
`Szepanski. “A Signal Theoretic Method for Creating Forg-
`ery—Proof Documents for Automatic Verification.” Proceed-
`ings 1979 Carnahan Conference on Crime Countermeasures,
`May 16, 1979, pp. 101-109.
`Tanaka et al.. “A Visual Retrieval System with Private
`Information for Image Database,” Proceeding International
`Conference on DSP Applications and Technology, Oct.
`[21] Appl. No.: 614,521
`1991, 00. 415-421.
`.
`Sapwater
`et
`al.,
`“Electronic Copyright Protection.”
`[22] Filed:
`Mar. 15, 1996
`PHOTO>Electronic Imaging, vol. 37. No. 6, 1994, pp.
`Related U.S. Application Data
`16-21.
`[63] Continuation of Ser. No. 215,289, Mar. 17, 1994, aban-|JPEG Group’s JPEG Software (release 4), FTP.CSU-
`doned, which is a continuation-in-part of Ser. No. 154,866,
`A.BerekeleyEDU
`/PUB/Cypherpunks/Applications/
`Nov. 18, 1993, abandoned.
`ISTEG/JPEG.Announcement.GZ. Jun. 7, 1993, 2 pages.
`[51] Want, CHS aeecccecccssssessscseseseeee GO06K 9/36; HO4L 9/00
`—Caronni, “Assuring Ownership Rights for Digital Images.”
`[82] U.S. C1 onccccssssesecsceccncacenenee 382/232; 380/4; 380/5;
`Published in the Proceedings of ‘Reliable IT Systems.” VIS
`382/100
`°O5, HH. Briiggemann and W. Gerhardt-Hiackl
`(Ed.),
`[58] Field of Search w..sssccssssssuessesee 380/3, 6, 19,23,
` Vieweg Publishing Company. Germany, 1995, Jun. 14.
`380/26, 49, 54, 55, 4, 10, 51, 5; 379/95;
`1994, 10 pages.
`341/67; 283/73, 113, 83. 82; 116/18; 395/375;
`Koch et al., “Copyright Protection for Multimedia Data.”
`382/232, 100, 276, 112, 115, 135, 181;
`Proc. of the International Conference on Digital Media and
`381/124, 29, 181; 348/460
`Electronic Publishing, Dec. 6-8, 1994. Leeds, U.K.. 15
`pages.
`
`(56]
`
`3,493,674
`3,569,619
`3,585,290
`
`References Cited
`U.S. PATENT DOCUMENTS
`2/1970 Houghton ...ccsscsscsssesssesserseessee 173/5.6
`.. 1786.8
`3/1971 Simijian ......
`
`G/LOTE Samford .0.......esecesscsseceseeseeeene 178/5.6
`.
`.
`(List continued on next page.)
`FOREIGN PATENT DOCUMENTS
`es tor hoo Burner por or "uu. HO4B 1/66
`411 232
`2/1991 European Pat. Off.
`...... HO4N 1/41;
`441702
`8/1991 European Pat. Off.
`........ GIIB 20/00
`493091
`7/1992 European Pat. Off.
`....... HO4N 1/387
`551016 Al
`7/1993 European Pat. Off. .
`......... GO7D 7/00
`581 3172/1994 European Pat. Off.
`581317.A2
`2/1994 European Pat. Off... GO7F 70
`605 208 AZ
`7/1994 European Pat. Off. .
`
`(List continued on next page.)
`
`Primary Examiner—Leo Boudreau
`Assistant Examiner—Bhavesh Mechta
`Attorney, Agent, or Firm—Klarquist Sparkman Campbell
`Leigh & Whinston
`
`[57]
`
`ABSTRACT
`
`An identification code signal is impressed on a carrier to be
`identified (such as an electronic data signal or a physical
`medium) in a manner that permits the identification signal
`_later to bestatistically discerned and the carrier thereby
`identified. The method and apparatus are characterized by
`robustness despite degradation of the encoded carrier, and
`by holographic permeation of the identification signal
`throughout thecarrier.
`
`MAO FMS NOISE
`
`(List continued on next page.)
`14 Claims, 3 Drawing Sheets
`
`| OATAIN OF CREATE ORIGINALDIGITALS:GHALOAMAGE”
`OAGITAL S:GAALOF MAGE,
`
`———ESTIMATEROUGHOFFSET |
`£
`CHOOSE NGA WAIT
`
`IRENTIRCATION WORD. £.¢ 32]
`GENERATE MBIT
`IDENTIFICATION WORD.
`
`GENERATE OASYNTHESIZE N"RANDOMINDEPENDENT
`SUGRMALSWITH ROUGHLYGAUSSIAN DISTRIBUTION
`ABQUTSOME MEAN VALUE, WHERE SIGNALS HAVE
`EQUAL EXTENT AND DIGITAL SPACING OF
`CARGHALDIGTAL BIONALOR IMAGE
`APPLY DIGITAL FILTER WHICH ATTENLATES
`BOTH LOWAND HIGH FREQUENCIES, LEAVING
`MADOLE-RUMGE FREQUENCIESLARGELY INTACT
`CONDENSE N RANDOM S1GNALS TOA LOWEST
`ACCEPTABLE BIT VALLE IF MAEARORY GF
`STORAGE SPACE 15AT A PREMIUM
`‘AODALLRANDOM IMAGES TOGETHER VRHICH HAWE
`‘A CORPESPONDING '1) IM THEDRASSOGATED
`BIT-PLACE-VALUE OF THE NvB(T IDENTIFICATIONWORD,
`CAGL THISTHE BASE COMPOSITE SIGNAL OF (MAGE
`EXPERIMENT VEOLRLLY WITH
`GAINAND GAbNA APPLIED
`TO BASE COMPOSITE SIGMAL CF IMAGE, ADO'NG THiSTD)
`‘OROGIHALDIGI“ALSIGMA. OR MIMIE, AND DETERMINING
`THE ACCEPTAGLE SERCEIVEDNOSE LEVEL,
`APPLY FOUNC GAB! AND GAMATOBABE COMPOSITE,
`ADD TO QAUGINAL, THEN CALL THIS
`THE DISTRIOUTABLE SIGNAL OR MAGE
`—__—___—_ a".
`‘STOREAWAY ANDSECURE OHGINAL S:G¥0AL OF IMAGE
`ALOHO WITHN-BIT IDERTIICATIONWORD AND:
`THEN RADONSIGNALS
`(_SELU OR DISTRIGUTE THE DISTRIBUTABLE SIGNAL OF IMAGE
`
`
`
`
`
`
`Sony Exhibit 1018
`Sony Exhibit 1018
`Sony v. MZ Audio
`Sony v. MZ Audio
`
`
`
`5,745,604
`
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`
`
`7/1990
`4,939,615
`7/1990
`4,941,150
`eeccesecesssenee 235/61.7
`4/1972 Yamamoto et AD,
`3,655,162
`7/1990
`4,943,973
`. 235/619 R
`11/1972 Philipson, Jr.
`.
`3,703,628
`7/1990
`4,943,916
`«. 340/146.3
`4/1974 Rothfjell
`........
`3,805,238
`7/1990
`4,944,036
`escssseesnee 348/450
`5/1974 Walker et al...
`3,809,806
`4,963,998 10/1990
`.............-.- 178/5.2R
`9/1974 Loughlin et all.
`3,838,444
`4,965,827 10/1990 McDonald .esssscossseseessensesen 380/25
`3,914,877 LO/LD7S Himes ....ccsssocrsesescassensaresesassseceescee 35/2
`. 358/142
`4,967,273 10/1990 Greenberg...
`
`11/1975 Ikegami et al.
`.
`«. 350/320
`3,922,074
`11/1990 O’Gradyet al.
`. 358/142
`4,969,041
`
`
`
` 7/1976 Maddoxetal. «« 348/473
`
`3,971,917
`.
`vase 380/3
`11/1990 Gross et al.
`4,972,471
`
`
`wees 178/56
`3,982,064
`9/1976 Bamaby ....
`11/1990 Nathans ......
`.. 380/23
`4,972,476
`
`3,984,624 10/1976 Waggener......
`wae 178/56
`4,979,210 12/1990 Nagata et al.
`......scecssecnscessesseeses 3380/3
`
`
`4,025,851
`5/1977 Haselwood et al.
`. 325/31
`2/1991 Piosenka .....
`4,993,068
`380/23
`4.225,967
`9/1980 Miwaetal.
`...
`. 455/68
`341/120
`4,996,530
`2/1991 Hilton.........
`
`4,230,990 10/1980 Lert, Jr. et al.
`woe 455/67
`4/1991 Schreiber et al.
`.
`soe 358/148
`5,010,405
`
`
`4231,113 10/1980 Blasbalg .....
`- 455/29
` G/L99L Soltesz oo...eseseecenesscnresneees 380/54
`5,027,401
`
`4,238,849 12/1980 Gassmamin ...cscssssecsoereccrsrencnecee 370/11
`. 370/125
`5,036,513
`7/1991 Greenblatt
`
`
`4,252,995
`2/1981 Schmidtet al.
`179/1 GD
`11/1991 Gibson........
`. 358/142
`5,063,446
`
`
`4/1981 Bright etal. ...
`.. 364/200
`4,262,329
` S75/L
`5,073,899 12/1991 Collier et al.
`
`1/1982 Maxemchuk...
`ww STOLL
`4,313,197
`5,075,773 12/1991 Pullen et al.
`358/141
`
`1/1983 Leventer et al.
`.. 358/147
`4,367,488
`5,077,608 12/1991 Dubner.....
`358/183
`
`4/1983 Warner...........
`179/1 GD
`4,379,947
`5,077,795 12/1991 Rourkeetal.
`380/55
`
`4/1983 Leventer et al.
`«+ 358/147
`4,380,027
`5,079,648
`1/1992 Mautfe ........00.
`. 360/31
`
`
`4,389,671
`6/1983 Fosnet ..........
`w. 358/124
`2/1992 Bloomberg et al.
`5,091,966
`382/21
`
`4,395,600
`7/1983 Lundy etal.
`+ 1791.5 M
`. 235/382
`3/1992 Miyata ............
`5,095,196
`
`4,423,415
`were 380/3
`5/1992 Best et al.....
`12/1983 Goldman ....
`. 340/825.34
`5,113,437
`
`
`
`4,425,642=1/1984 Moses et al. ..sscseccsccsscsresecerseenee 3775/1 5,128,525 7/1992 Stearns et al. . 935/454
`
`
`4,476,468 5,144,660—9/1992 Rose .......scsssscesesseasesansesanenenacveseres 380/410/1984 Goldman .... 340/825.034
`
`
`
`
`
`9/1992 Resnikoff et al.
`4,528,588
`«7/1985 Lifberg 0...
`esssesssececensrecenee 358/122
`5,148,498
`382/54
`.- 380/23
`9/1992 Elsner ......
`4,532,508
`7/1985 Ruell .......
`. 340/825.34
`5,150,409
`
`5,161,210 11/1992 Druyvesteyn et al
`wee 395/2
`4,547,804 10/1985 Greenberg
`wo» 398/142
`11/1992 Milheiser........
`340/825.54
`4,553,261
`11/1985 Froessel
`2.0...
`sceecceeereecneete 382/57
`5,166,676
`4,590,366
`5/1986 Rothfjell
`.
`ws 235/494
`5,168,146 12/1992 Bloomberg
`. 235/456
`4,595,950
`6/1986 Lofberg ...
`.. 358/122
`5,181,786
`1/1993 Hujink ........
`w=
`382/2
`4,637,051
`1/1987 Clark.......
`» 382/1
`5,185,736
`2/1993 Tyrrell et al.
`oe 370/55
`4,639,779
`1/1987 Greenberg ..
`we. 358/142
`5,199,081
`3/1993 Saito et al. oc
`ssscssnsesnsssnseenssane 382/2
`
`3/1987 Butler etal. ...
`.. 358/185
`4,647,974
`5,200,822
`4/1993 Bronfin et al.
`. 358/142
`3/1987 Labedz etal.
`wee 379/59
`4,654,867
`5,212,551
`5/1993 Conanan .....
`. 358/143
`
`
`4/1987 Dlugos ..........
`weve 380/23
`4,660,221
`5,213,337
`5/1993 Sherman ..
`. 273/439
`5/1987 Borror etal.
`..
`«. 235/487
`4,663,518
`5,228,056
`7/1993 Schilling .....
`375A
`
`
`5/1987 Cooper...........
`a» 358/145
`. 358/142
`4,665,431
`5,243,423
`9/1993 DelJean et al.
`6/1987 Hustig etal.
`..
`wee 370/76
`9/1993 Zhang o.n.ccecccsccsssssscoesessssetsees 235/454
`4,672,605
`$245,165
`
`6/1987 Tetrick et al. oo...ccscesseceseees 358/296
`340/825.31
`9/1993 Gokcebay...
`4,675,746
`5,245,329
`
`..
` 358/191.1
`4,677,435
`6/1987 Causse D’Agraives et al.
`. 340/825.31
`5,247,364
`9/1993 Banker et al.
`
`10/1993 Balkanski et al. ..
`wwe 358/426
`4,682,794
`7/1987 Margolin .
`. 283/82
`5,253,078
`......
`. 358/438
`4,703,476 10/1987 Howard .......cccsssscesscosrenenseanoore 370/76
`5,257,119 10/1993 Funada et al.
`
`.
`w« 380/23
`4,712,103 12/1987 Gotanda ..
`~ 340/825.31
`5,259,025
`11/1993 Monroe et al.
`
`
`
`
`
`
`4,718,106 1/1988 Weimblatt2...sccccssecsecssecsessaee 455/2 5,267,334 11/1993 Normille et al. ... . 382/56
`1/1994 Sugiyama et al.
`..
`. 375/1
`4,739,377
`4/1988 Allen .......
`... 355/133
`5,280,537
`
`........
`4,750,173
`6/1988 Bliithgen....
`a» S7TO/111
`5,293,399
`3/1994 Hefti
`375/7
`al.
`. 382/56
`3/1994 Krause et
`4,765,656
`8/1988 Becker et al.
`we 283/70
`5,295,203
`
`3/1994 Pack et al.
`...
`358/261 .3
`4,775,901
`10/1988 Nakano......
`a 360/60
`5,299,019
`
`4/1994 Butera ..
`a». 382/56
`4,776,013 10/1988 Kafr etal.
`.
`wee 380/54
`5,305,400
`
`5/1994 Tow ........
`235/494
`4,805,020
`2/1989 Greenberg ......
`.» 358/147
`5,315,098
`6/1994 Copriviza et al.
`..
`. 348/46
`4,807,031
`2/1989 Broughtonet al.
`- 358/142
`5,319,453
`
`6/1994 Blonstein et al.
`..
`382/56
`4,811,357
`3/1989 Betts et al......
`« SIA
`5,319,724
`395/2.14
`4,811,408
`3/1989 Goldman .
`wo. 382/2
`5,319,735
`6/1994 Preuss etal.
`...
`4,820,912
`4/1989 Samyn ..
`aw» 235/449
`5,325,167
`6/1994
`4,835,517
`5/1989 van der Grachtet al.
`340/310 A
`5,327,237
`7/1994
`4,855,827
`8/1989 Best
`........
`.-- 358/143
`§,337,362
`8/1994
`
`al.
`4,864,618
`9/1989 Weight et
`see 380/51
`5,349,655
`9/1994
`
`4,866,771—Q/1989 Baim cescsssccsrecssceccsensresseessoecesare 380/23 5,351,302 9/1994
`
`4,874,936 10/1989 Chandler etal.
`.. 358/450
`5,379,345
`1/1995
`4,876,617 10/1989 Bestet al. ..........
`+. 360/60
`5,387,941
`2/1995
`
`11/1989 Leighton et al.
`..
`. 380/23
`4,879,747
`5,394,274
`2/1995 Kahn
`
`11/1989 Pommier........
`... 358/142
`4,884,139
`5,396,559
`3/1995
`4,885,632 12/1989 Mabeyet al.
`we 358/84
`5,398,283
`3/1995
`4,903,301
`2/1990 Kondoetal........
`. 3810
`5,404,160
`4/1995
`
`4,908,836
`3/1990 Rushforth et al.
`.
`. 341/51
`5,404,377
`4/1995
`4,908,873
`3/1990 Philibert et al.
`...
`. 382/34
`5,408,542
`4/1995
`4/1990 Cook ........000.
`4,920,503
`364/521
`5,418,853
`5/1995
`
`5/1990 Shiang et al.
`......ccomseesrceneenente 283/87
`4,921,278
`5,422,963
`6/1995
`
`
`
`.
`
`
`
`.
`
`
`
`
`
`
`
`
`
`
`
`,
`
`LivA
`
`os
`
`oo
`
`..
`
`”
`
`5,745,604
` Page 3
`
`W095/20291
`WO 9626494
`WO 9627259
`
`7/1995 WIPO.
`8/1996 WIPO.
`9/1996 WIPO.
`
`6/1995 Aoki et ab. cccessen 395/162
`§,422,995
`
`6/1995 Thomas etal.
`ww 380/20
`5,425,100
`6/1995 Moskowitz ....
`370/60
`5,428,606
`6/1995 Hiller etal.
`...
`370/60.1
`5,428,607
`
`
`OTHER PUBLICATIONS
`7/1995 Thibadeaw et ab.
`....ssssesesereesnee 348/6
`5,432,542
`“Access Control and COpyright Protection for Images,
`7/1995 Schwartz .......
`382/232
`3,432,870
`a
`8/1995 Leslie ..
`235/487
`5,446,273
`WorkPackage 8: Watermarking.
`Jun. 30, 1995. 46 pages.
`9/1995 Keene .
`348/1
`5,450,122
`“Access Control and COpyright Protection for Images.
`9/1995 Jensen ett al.
`sassssessssssssssessnesssen 3806
`5,450,490
`
`WorkPackage 3: Evaluation of Existing Systems,” Apr. 19,
`5,461,426 10/1995 Limberg etal.
`348/475
`1995, 68 pages.
`5,469,506 11/1995 Berson......
`380/23
`Boneh,“Collusion-Secure Fingerprinting for Digital Data.”
`5,473,631
`12/1995 Moses.......
`375/202
`
`Department of Computer Science. Princeton University,
`5,479,168 12/1995 Johnsonet al.
`341/110
`
`-4995, 31 pages.
`...
`on 348/1
`1/1996 Thomas et al.
`5,481,294
`Burgett et al.. “A Novel Method for Copyright Labeling
`» 380/54
`1/1996 Shamir......
`5,488,664
`sare
`”
`.
`vere 380/10
`5,499,294
`3/1996 Friedman
`
`Digitized Image Data,”
`requested by e-mail from author
`5.515.081
`5/1996 Vasilik
`345/189
`
`5,524,933 -» 283/67~~“(unavailable/password protected on IGD WWW site);6/1996 Kuntet al......
`
`
`6/1996 Braudawayet al.
`w. 380/54
`5,530,759
`received Sep. 18, 1995, 12 pages.
`7/1996 Hartick etal. ...
`364/419.1
`5,532,920
`Friedman, “The Trustworthy Digital Camera: Restoring
`$,537,223
`7/1996 Curry...
`.» 358/460
`Credibility to the Photographic Image.” IEEE Transactions
`5,539,471
`7/1996 Myhrvold etal. .
`-- 348/473
`on Consumer Electronics. vol. 39, No. 4, Nov.. 1993. pp.
`5,539,735
`7/1996 Moskowitz ....
`... 37060-95910.
`
`
`
`“Cyphertech Systems: Introduces Digital Encoding Device
`. ate
`Sisal7a auieee éfams et al
`. Prevent TV Piracy,” Hollywood Reporter, Oct. 20, 1993.
`” 3go/119
`5544255
`8/1996 Smithies et al
`n
`Dp:
`:
`4
`rat
`8/1996 Aziz et al
`5,548,646
`we 380/23
`
`5,557,333 9/1996 Fungo et ab. ccsscsseeecsneesnsnee 349/473|“NAB—Cyphertech Starts Anti-Piracy Broadcast Tests.
`
`scssssssessenersnnssee 349/432
`5,559,559
`9/1996 Jungoet al.
`Newsbytes, NEW03230023, Mar. 23, 1994.
`
`.....ecseccccecsoneesnsenesees 348/6
`5,568,179 10/1996 Dich! et al.
`Humphrey, “Stamping Out Crime,” Hollywood Reporter,
`5,568,570 10/1996 Rabbani
`....
`382/238
`Jan. 26, 1994, p. S48.
`
`
`235/494
`5,572,010 11/1996 Petrie .....
`Kochetal., “Towards Robust and Hidden Image Copyright
`11/1996 Montgomery etal.
`5,572,247
`348/10
`Labeling,” Proc. of 1995 IEEE Workshop on Nonlinear
`oe8e 11/1996 Hecht srtterneeeasanee
`235/494
`Signal and Image Processing, Jun. 20-22, 1995, 4 pages.
`
`379,124 11/1996 Aijala et al.
`...
`386/96
`“Copyright Protection for Digital Images, Digital Finger-
`....
`5,582,103 12/1996 Tanaka et al.
`101/32
`we
`*
`or
`
`printing from FBI,” Highwater FBI brochure. 1995. 4 pages.
`
`5,587,743 12/1996 Montgomery et
`348/473
`“High W.
`FBI
`Limited
`:
`C
`oh
`....
`gh Water
`FBI Limited Presentation Image
`Copyright
`5,590,197 12/1996 Chenet al.
`380/24
`5,602,920
`2/1997 Bestler et al.
`.
`380/49
`Protection Software,” FBI Ltd brochure, Jul., 1995, 17
`
`
`~ 380/4
`5,606,609
`2/1997 Houser et al.
`.
`pages.
`3/1997 Pettic «seen
`. 283/67
`5,611,575
`Boland et al, “Watermarking Digital Images for Copyright
`5,613,004
`3/1997 Cooperman et al
`» 380/28
`Protection,” Fifth International Conference on Image Pro-
`5,613,012
`3/1997 Hoffman etal
`~ 382/115
`cessing and its Applications, Conference Date 4-6 Jul. 1995.
`
`jee 3/1997 Cobbley et al.
`..
`~~ 3487
`Conf. Publ. No. 410, pp. 326-330.
`4/1997 Montgomery .....
`» 348/473
`5,617,148
`“Steganography,” Intellectual Property and the National
`........
`358/261.1
`5,629,770
`5/1997 Brassil
`:
`.
`
`Information Infrastructure The Report ofthe Working Group
`wee 380/4
`5,629,980
`5/1997 Stefik et al.
`:
`«3580/4
`6/1997 Stefik et al.
`on Intellectual Property Rights, Sep. 1995, pp. 212-213.
`5,638,443
`
`. 380/25
`5,638,446
`6/1997 Rubin .....
`Caruso, “Digital Commerce, 2 plans for watermarks, which
`
`7/1997 Barton ........snsesee
`.- 380/23
`5,646,997
`can bind proof of authorship to electronic works.” New York
`5,659,726
`8/1997 Sandford, II et al.
`- 395/612
`Times, Aug. 7, 1995, one page.
`
`8/1997 Kawana ...........
`. 358/501
`5,661,574
`“Holographic signatures for digital images,” The Seybold
`
`-. 380/54
`5,664,018
`9/1997 Leightonetal. .
`Report on Desktop Publishing, Aug. 1995, one page.
`9/1997 Goodman et al. wo.395/200.76
`5,666,487
`Clarke,“Invisible Code Tags Electronic Images.” Electronic
`FOREIGN PATENT DOCUMENTS
`Engineering Times, Jun. 12, 1995, n. 852, p. 42.
`“The Copyright Can of Worms Opened Up By The New
`eaoonOA 411998 European Pa On serene GO6K 15A02
`Electronic
`Media.”
`Computergram
`_—_Internations,
`uropean Vat.
`Ou.
`.
`pCGN07170006, Jul. 17, 1995 and The Copyright Can of
`650 146 Ai
`4/1995 European Pat. Off.
`.
`A
`:
`705.0252
`4/1996 European Pat. Off.
`.
`Worms Opened Up By the New Electronic Media—2,
`9/1989 Germany.........
`.. HO4B 1/66
`3806411
`Computergram Internations, pCGN07210008. Jul. 21, 1995,
`
`4-248771 . HO4N 1/44=3 pages.9/1992 Japan ...
`
`
`
`
`5-242217—Q/N993 Japan ...cesssesscasseanesssenseses GO6F 15/62 “Access Control and COpyright Protection for Images,
`
`8-30759
`2/1996 Japan.
`WorkPackage 1: Access Control and Copyright Protection
`2063018
`5/1981 United Kingdom .
`for Images Need Evaluation,” Jun., 1995, 21 pages.
`7/1981 United Kingdom ........... HON 7/16
`2.067 871
`“access Control and COpyright Protection for Images.
`
`.. GLB 2008
`2196167
`4/1988 United Kingdom
`Conditi
`.
`.
`:
`:
`‘onditional Access and Copyright Protection Based on the
`11/1988 United Kingdom ............ G11B 23/28
`2 204 984
`U
`£T
`d Third Parties.” 1995. 43
`WO89/08915 +17pages.9/1989 WIPO. se of Trustes arties,
`
`
`
`
`
`WO 93725038
`12/1993 WIPO.
`Luc, “Analysis of Spread Spectrum System Parameters for
`WO95/10835
`4/1995 WIPO.
`Design of Hidden Transmission.” Radioengineering, vol. 4,
`WO95/14289
`5/1995 WIPO.
`No. 2, Jun. 1995, pp. 26-29.
`
`
`
`5,745,604
`Page 4
`
`Macq,“Cryptology for Digital TV Broadcasting.” Proceed-
`ings of the IEEE, vol. 83. No. 6, Jun. 1995, pp. 944-957.
`Zhao et al., “Embedding Robust Labels Into Images for
`Copyright Protection,” Proc. of the International Congress
`on Intellectual Property Rightsfor Specialized information,
`Knowledge and New Technologies (Vienna, Austria) Aug.
`21-25, 1995, 10 pages.
`Frequently Asked Questions About Digimarc Signature
`Technology, Aug. 1, 1995, HTTP:s//WWW.DIGIMARC-
`.COM,9 pages.
`Bender et al, “Techniques for Data Hiding.” Draft Preprint,
`Private Correspondence, dated Oct. 30, 1995.
`Johhnson, “Steganography,” Dec. 10, 1995, 32 pages.
`Aura. “Invisible Communication,” Helskinki University of
`Technology, Digital Systems Laboratory, Nov. 5, 1995, 13
`pages.
`Cox et al., “Secure Spread Spectrum Watermarking for
`Multimedia,” NEC Research Institute Technical Report,
`Dec. 5, 1995, 33 pages.
`Digimarc presentation at RSA Conference. approximately
`Jan. 17, 1996, 4 pages.
`Hecht, “Embedded Data Glyph Technology for Hardcopy
`Digital Documents,” SPIE vol. 2171, Feb. 1994, pp.
`341-352.
`Roberts, “Picture Coding Using Pseudorandom Noise,” IRE
`Trans. on Information Theory, vol. 8, No. 2, Feb., 1962, pp.
`145-154.
`
`Choudhury, et al, “Copyright Protection for Electronic
`Publishing over Computer Networks,” /EEE Network
`Magazine, Jun. 1994, 18 pages.
`Moller, et al., “Rechnergestutzte Steganographie: Wie sie
`Funktioniert und warum folglich jede Reglementierung von
`Verschiusselung unsinnig ist,” DuD, Datenschutz und Dat-
`ensicherung, 18/6 (1994) 318-326.
`Pennebaker et al., JPEG Stilt Image Data Compression
`Standard, Chapter 3, “Aspects of the Human Visual Sys-
`tem,” pp. 23-27, 1993, Van Nostrand Reinhold, New York.
`Castroetal., “Registration ofTranslated and Rotated Images
`Using Finite Fourier Transforms,” [EEE Transactions on
`Pattern Analysis and Machine intelligence, vol. PAMI-9,
`No. 5, Sep. 1987, pp. 700-703.
`Weberet al., “Correlative Image Registration,” Seminars in
`Nuclear Medicine, vol. XXIV, No. 4, Oct., 1994, pp.
`311-323.
`Toga et al., “Registration Revisited,” Journal of Neuro-
`science Methods, 48 (1993), pp. 1-13.
`Sheng et al., “Experiments on Pattern Recognition Using
`Invariant Fourier-Mellin Descriptors,” fourmal of Optical
`Society ofAmerica, vol. 3, No. 6, Jun., 1986, pp. 771-776.
`Kurak et al., “A Cautionary Note On Image Downgrading,”
`1992 IEEE, pp. 153-159.
`Wagner, “Fingerprinting,” 1983 IEEE, pp. 18-22.
`Sandford I, et al., “The Data Embedding Method,” SPIE
`vol. 2615, Oct. 23, 1995, pp. 226-259.
`Brassil et al., “Hiding Information in Document Images,”
`Nov., 1995. 7 pages.
`Pitas et al., “Applying Signatures on Digital Images.” TEEE
`Workshop on Nonlinear Image and Signal Processing, Neos
`Marmaras. Greece. pp. 460-463. Jun., 1995.
`Koch et al., “Digital Copyright Labeling: Providing Evi-
`dence of Misuse and Tracking Unauthorized Distribution of
`Copyrighted Materials.” OASIS Magazine. Dec. 1995, 3
`pages.
`
`Rindfrey. “Towards an Equitable System for Access Control
`and Copyright Protection in Broadcast Image Services: The
`Equicrypt Approach,” intellectual Property Rights and New
`Technologies, Proc. of the Conference, R. Oldenbourg Ver-
`lag Wien Miinchen 1995, 12 pages.
`Delaigle et al., “Digital Watermarking.” Proc. SPIE—Int.
`Soc. Opt. Eng.. vol. 2659, pp. 99-110, 1996.
`Dautzenberg,
`“Watermarking Images.” Department of
`Microelectronics and Electrical Engineering, Trinity Col-
`lege Dublin, 47 pages, Oct. 1994.
`Boucqueau et al., Equitable Conditional Access and Copy-
`right Protection for Image Based on Trusted Third Parties.
`Teleservices & Multimedia Communications, 2nd Int. Cost
`237 Workshop, Second International COST 237 Workshop,
`Nov., 1995; published 1996, pp. 229-243.
`New Product Information, “FBI at AppleExpo” (Olympia.
`London), Nov., 1995. 2 pages.
`ORuanaidh et al, “Watermarking Digital Images for Copy-
`right Protection,” http://www.kalman.mee.ted.ie/people/jjr/
`eva_pap.html, Feb. 2, 1996, 8 pages.
`DICE Digital Watermark System, Q&A. Dec., 1995, 12
`pages.
`Ohnishi et al., Embedding a Seal into a Picture Under
`Orthogonal Wavelet Transform, Proceedings of Multimedia
`°96, 1996, IEEE, pp. 514-521.
`Boney et al., “Digital Watermarks for Audio Signals,”
`Proceedings of Multimedia "96, 1996 IEEE, pp. 473-480.
`Arazi, et al., “Intuition, Perception, and Secure Communi-
`cation,” IEEE Transactionson Systems, Man, and Cybernet-
`ics, vol. 19, No. 5, Sep/Oct. 1989, pp. 1016-1020.
`van Schyndel etal., “Towards a Robust Digital Watermark.”
`ACCV '95, vol. 2, Dec., 1995, pp. 504-508.
`Bruyndonckx etal., “Spatial Method for Copyright Labeling
`of Digital Images,” 1994, 6 pages.
`“Watermarking & Digital Signature: Protect Your Work!”
`_ Published on Internet 1996, http://ltswww.epfl.ch/~jordan/
`watermarkinghtml.
`Gabor, et al., “Theory of Communication,” J. Inst. Elect.
`Eng. 93, 1946, pp. 429-441.
`Bruyndonckx et al., Neural Network Post-Processing of
`Coded Images Using Perceptual Masking. 1994, 3 pages.
`Pickholtz et al., “Theory of Spread-Spectrum Communica-
`tions—A Tutorial,” Transactions on Communications, vol.
`COM-30, No. 5, May, 1982, pp. 855-884.
`Sklar, “A Structured Overview of Digital Communica-
`tions—a Tutorial Review—Part 1,” IEEE Communications
`Magazine, Aug., 1983, pp. 1-17.
`Sklar, “A Structured Overview of Digital Communica-
`tions—a Tutorial Review—Part IT.” IEEE Communications
`Magazine, Oct., 1983. pp. 6-21.
`Tirkel et al.. “A Two-Dimensional Digital Watermark.”
`1995, 6 pages.
`Delaigle etal., “A Psychovisual Approach for Digital Picture.
`Watermarking,” 1995, 20 pages.
`Fimmerstad, “The Virtual Art Museum,” Ericsson Connex-
`ion, Dec., 1995, pp. 29-31.
`Mintzer et al., “Toward on-line, Worldwide Accessto Vati-
`can Library Materials,” IBM J. Res. Develop. vol. 40 No.2.
`Mar., 1996, pp. 139-162.
`Hartung et al., Digital Watermarking of Raw and Com-
`pressed Video, 1996, 9 pages.
`Cox et al, “A Secure, Imperceptable Yet Perceptually
`Salient, Spread Spectrum Watermark for Multimedia.”
`IEEE,Southcon/96, Conference Record, pp. 192-197, 1996.
`
`
`
`5,745,604
`Page 5
`
`Nakamuraet al.. “A Unified Coding Method of Image and
`Text Data Using Discrete Orthogonal Transform.” Systems
`and Computers in Japan, vol. 21, No. 3. 1990, pp. 87-92.
`Simmons, “Subliminal Channels; Past and Present,” ETT,
`vol. 5, No. 4, Jul-Aug. 1994, pp. 45-59.
`Nakamura et al, “A Unified Coding Method of Dithered
`Image and Text Data Using Micropatterns,” Electronics and
`Communications in Japan, Part 1, vol. 72, No. 4, 1989, pp.
`50-56.
`Tanaka, “Embedding the Attribute Information Into a Dith-
`ered Image,” Systems and Computers in Japan, vol. 21, No.
`7, 1990, pp. 43-50.
`Short, “Steps Toward Unmasking Secure Communications.”
`International Journal of Bifurcation and Chaos, vol. 4, No.
`4, 1994, pp. 959-977.
`Schreiberet al.. “A Compatibie High—Definition Television
`System Using the Noise-Margin Method of Hiding
`EnhancementInformation.” SMPTE Journal, Dec. 1989.pp.
`873-879.
`Tanaka etal., “New Integrated Coding Schemes for Com-
`puter—Aided Facsimile,” Proc. IEEE Int'l Conf. on Sys.
`Integration, Apr. 1990, pp. 275-281.
`Tanaka et al., “Embedding Secret Information Into a Dith-
`ered Multi-Level Image.” Proc.
`IEEE Military Comm.
`Conf., Sep. 1990, pp. 216-220.
`Matsui et al., “Video—Steganography: How to Secretly
`Embed a Signature in a Picture,” IMA Intellectual Property
`Project Proceedings, Jan. 1994, vol. 1, Issue 1, pp. 187-205.
`van Schyndel et al., “A Digital Watermark,” JEEE Interna-
`tional Conference on Image Processing, Nov. 13-16, 1994,
`pp. 86-90.
`Fitzgerald, “Invisible Digital Copyright ID.” Editor & Pub-
`lisher, Jun, 25, 1994, p. 62.
`“Foiling Card Forgers with Magnetic ‘Noise,’” Wail Street
`Journal, Feb. 8, 1994,
`Wise, “The History of Copyright, Photographers’ Rights
`Span Three Centuries,” PHOTO>Electronic Imaging, vol.
`37, No. 6, 1994.
`Kassam, Signal Detection in Non—Gaussian Noise, Dowden
`& Culver, 1988, 96 pages.
`
`Brassil et al., Electronic Marking and Identification Tech-
`niques to Discourage Document Copying, Proceedings of
`INFOCOM ’94 Conference on Computer, IEEE Commun.
`Soc Conference, Jan. 12-16. 1994, pp. 1278-1287.
`Jain, “Image Coding Via a Nearest Neighbors Image
`Model.” IEEE Transactions on Communications, vol.
`COM-23, No. 3, Mar. 1975. pp. 318-331.
`Arthur, “Digital Fingerprints Protect Artwork.” New Scien-
`tist, Nov. 12, 1994, p. 24.
`Matthews, “When Seeing is Not Believing.” New Scientist,
`Oct. 16, 1993, pp. 13-15.
`Bender et al., “Techniques for Data Hiding.” Massachusetts
`Institute of Technology, Media Laboratory, Jan. 1995, 10
`pages.
`Walton, “Image Authentication for a Slippery New Age.” Dr.
`Dobb’s Journal, Apr. 1995, pp. 18-26. 82-87.
`Port, “Halting Highway Robbery on the Internet.” Business
`Week, Oct. 17, 1994, p. 212.
`Machado. R.. “Announcing Stego 1.0a2, The First Stegan-
`ography Tool for the Macintosh.” Noy. 28. 1993.
`Arachelian, Ray, White Noise Storm (text of computer file
`WNSTORM.DOC), Apr. 11. 1994.
`Brown, Andy, S-Tools for Windows (text of computer file
`MANUAL.TXT), Mar. 6, 1994.
`Shaggy @phantom.com, “Hide and Seek v. 4.0” (text of
`computer file HIDESEEK.DOC), Apr. 10, 1994.
`Komatsu et al., A Proposal on Digital Watermark in Docu-
`ment Image Communication and Its Application to Realiz-
`ing a Signature, ISSN, Electronics and Communications in
`Japan, Part 1, vol. 73, No. 5, 1990, pp. 22-32.
`Schneier, Cryptographic Algorithms Can Create Nonforge-
`able Signatures for Electronic Documents, making Them
`Valid Legal Instruments, Byte, Nov., 1993, pp. 309-312.
`Komatsu et al., “Authentication System Using Concealed
`Image in Telematics,” Memoirs of the School of Science &
`Engineering, Waseda Univ.. No. 52. 1988. pp. 45-60.
`Tirkel et al, “Electronic Water Mark.” DICTA~93, Macqua-
`rie University, Sydney, Australia, Dec.. 1993, pp. 666-673.
`
`
`
`U.S. Patent
`
`Apr. 28, 1998
`
`Sheet 1 of 3
`
`5,745,604
`
`FIG. 4
`
`FIG. 1
`
`COMPUTER
`
`106
`
`104
`
`100
`
`——> EXPOSE AND STEP
`
`DIGITAL
`NUMBER
`(SIGNAL
`LEVEL)
`
`iG°:TTllTENtPorth©
` ~n—ax
`woOo
`zCCH&
`
`THU5
`
`HS
`
`.
`SAMPLE NUMBER(INDEX)
`
`
`
`
`
`
`U.S. Patent
`
`Apr. 28, 1998
`
`Sheet 2 of 3
`
`5,745,604
`
`FIG. 2
`
`OBTAIN OR CREATE ORIGINAL
`DIGITAL SIGNAL OR IMAGE
`
`ESTIMATE ROUGH OFFSET
`AND RMS NOISE
`
`CHOOSE N OR N-BIT
`IDENTIFICATION WORD,E.G. 32
`
`
`
`
`
`
`
`
`
`GENERATE OR SYNTHESIZE N "RANDOM® INDEPENDENT
`SIGNALS WITH ROUGHLY GAUSSIAN DISTRIBUTION
`ABOUT SOME MEAN VALUE, WHERE SIGNALS HAVE
`
`
`EQUAL EXTENT AND DIGITAL SPACING OF
`ORIGINAL DIGITAL SIGNAL OR IMAGE
`
`
`
`APPLY DIGITAL FILTER WHICH ATTENUATES
`
`
`BOTH LOW AND HIGH FREQUENCIES, LEAVING
`MIDDLE-RANGE FREQUENCIES LARGELYINTACT
`
`
`
`CONDENSE N RANDOM SIGNALS TO A LOWEST
`ACCEPTABLE BIT VALUE IF MEMORY OR
`
`STORAGE SPACE IS AT A PREMIUM
`
`
`ADD ALL RANDOM IMAGES TOGETHER WHICH HAVE
`A CORRESPONDING '1' IN THEIR ASSOCIATED
`
`
`BIT-PLACE-VALUE OF THE N-BIT IDENTIFICATION WORD,
`CALL THIS THE BASE COMPOSITE SIGNAL OR IMAGE
`
`
`
`EXPERIMENT VISUALLY WITH GAIN AND GAMMA APPLIED
`
`
`TO BASE COMPOSITE SIGNAL OR IMAGE, ADDING THIS TO
`ORIGINAL DIGITAL SIGNAL OR IMAGE, AND DETERMINING
`THE ACCEPTABLE PERCEIVED NOISE LEVEL
`
`
`
`APPLY FOUND GAIN AND GAMMA TO BASE COMPOSITE,
`ADD TO ORIGINAL, THEN CALL THIS
`THE DISTRIBUTABLE SIGNAL OR IMAGE
`
`
`
`
`
`STORE AWAY AND SECURE ORIGINAL SIGNAL OR IMAGE,
`ALONG WITH N-BIT IDENTIFICATION WORD AND
`
`
`THEN RANDOM SIGNALS
`
`
`SELL OR DISTRIBUTE THE DISTRIBUTABLE SIGNAL OR IMAGE
`
`GENERATE N-BIT
`IDENTIFICATION WORD
`
`
`
`
`
`
`
`U.S. Patent
`
`Apr. 28, 1998
`
`Sheet 3 of 3
`
`5,745,604
`
`FIG. 3|OBTAIN DIGITAL OR NON-DIGITAL COPY
`OF SUSPECT SIGNAL OR IMAGE
`
`DIGITIZE IF NOT ALREADY DIGITAL
`
`
`CUT AND MASK PORTION OF SIGNAL OR IMAGE
`BELIEVED TO BE SUSPECT
`
`
`(ONLYIF ENTIRE SIGNAL OR IMAGE 1S NOT SUSPECT)
`
`
`
`
`
`PROCUREORIGINAL DIGITAL SIGNAL OR
`IMAGE AND CUT AND MASK TO ROUGHLY
`
`
`THE SAME LOCATION OR SEQUENCE
`
`
`
`_ VISUALLY RESCALE AND REGISTER THE CUT-OUT
`SUSPECT SIGNAL TO THE CUT-OUT ORIGINAL SIGNAL
`
`RUN THROUGH SEARCH PROGRAMWITH MEAN
`SQUARED ERRORAS CRITERIA AND X OFFSET, Y OFFSET,
`AND SCALE AS THE THREE VARIABLES
`
`
`
`
`
`
`
`
`
`
`APPLY X OFFSET, Y OFFSET, AND SCALE TO CUT-OUT SUSPECT,
`THEN RESAMPLE ONTO EXACT GRID AND CUT-OUT
`
` OF ORIGINAL SIGNAL
`
`
`RUN THROUGH SEARCH PROGRAM WITH MEAN
`
`
`SQUARED ERROR AS CRITERIA AND DC OFFSET, GAIN, AND
`GAMMA AS THE THREE VARIABLES; APPLY TO SUSPECT
`
`
`
`SUBTRACT ORIGINAL FROM SUSPECT,
`GIVING DIFFERENCE SIGNAL OR IMAGE
`
`
`
`STEP THROUGH ALL N RANDOM INDEPENDENTSIGNALS, MASKED
`AS ORIGINAL AND CROSS-CORRELATEDWITH DIFFERENCE SIGNAL
`
`
`IN IMMEDIATE NEIGHBORHOOD OF REGISTRATION POINTS
`
`FIND 0 AND 1 LEVEL BY AVERAGING FIRST FOUR 0101 CODE VALUES
`
`ASSIGN EITHER AO OR A 1 TO EACH CROSS-CORRELATION RESULT|
`DEPENDING ON PROXIMITY TO THE AVERAGES OF PREVIOUS STEP|
`
`CHECK RESULT AGAINST SECURED IDENTIFICATION NUMBER
`
`PROSECUTEIF IT MATCHES? OR AT LEAST SEND
`A NASTY LETTER DEMANDING RECOMPENSE
`
`
`
`1
`IDENTIFICATION/AUTHENTICATION
`SYSTEM USING ROBUST, DISTRIBUTED
`CODING
`
`RELATED APPLICATION DATA
`
`This application is a continuation of application Ser. No.
`08/215.289, filed Mar. 17, 1994, which is a continuation-
`in-part of application Ser. No. 08/154,.866, filed Nov. 18,
`1993, both now abandoned.
`
`FIELD OF THE INVENTION
`
`The present invention relates to the embedding of robust
`identification codes in electronic, optical and physical
`media, and the subsequent, objective discernment of such
`codes for identification purposes even after intervening
`distortion or corruption of the media.
`The invention is illustrated with reference to a few
`exemplary applications, including electronic imagery, emul-
`sion film, and paper currency, but is not so limited.
`
`BACKGROUND AND SUMMARY OF THE
`INVENTION
`
`“I would never put it in the power of any printer or
`publisher to suppressoralter a work of mine, by making him
`master of the copy” ThomasPaine, Rights of Man, 1792.
`“The printer dares not go beyond his licensed copy”
`Milton, Aeropagetica, 1644.
`Since time immemorial, unauthorized use and outright
`piracy of audio and visual source material has caused lost
`revenues to the owners of such material, and has been a
`source of confusion and corruption of original work.
`With the advent of digitizing data audio signals and
`images, the technology of copying materials and redistrib-
`uting them in an unauthorized manner has reached new
`heights of sophistication, and more importantly, omnipres-
`ence. Lacking objective means for comparing an alleged
`copy of material with the original, owners and possible
`litigation proceedings are left with a subjective opinion of
`whether the alleged copy is stolen, or has been used in an
`unauthorized manner. Furthermore, there is no simple means
`of tracing a path to an original purchaser of the material,
`something which can be valuable in tracing where a possible
`“leak” of the material first occurred.
`
`A variety of methods for protecting commercial material
`have been attempted. One is to scramble signals via an
`encoding method priorto distribution, and descramble prior
`to use. This technique, however, requires that both the
`original and later descrambled signals never leave closed
`and controlled networks,
`lest
`they be intercepted and
`recorded. Furthermore, this arrangementis oflittle use in the
`broad field of mass marketing audio and visual material,
`where even a few dollars extra cost causes a major reduction
`in market, and where the signal must eventually be
`descrambied to be perceived and thus can be easily recorded.
`Another class of techniques relies on modification of
`source audio or video signals to include a subliminal iden-
`tification signal, which can be sensed by electronic means.
`-Examples of such systems are found in U.S. Pat. No.
`4,972,471 and European patent publication EP 441,702, as
`well as in Komatsu et al, “Authentication System Using
`Concealed. Image in Telematics,” Memoirs of the School of
`Science & Engineering, Waseda University, N