throbber
(cid:15)(cid:26)(cid:20)(cid:28)(cid:19)(cid:23)(cid:22)(cid:25)(cid:1)(cid:16)(cid:25)(cid:29)(cid:21)(cid:24)(cid:26)(cid:27)(cid:21)(cid:1)(cid:18)(cid:15)(cid:12)(cid:1)(cid:10)(cid:5)(cid:13)(cid:4)(cid:14)(cid:4)(cid:8)(cid:3)(cid:2)(cid:17)(cid:10)(cid:14)(cid:3)(cid:2)(cid:6)(cid:14)(cid:10)(cid:11)(cid:2)(cid:14)(cid:10)(cid:9)(cid:8)(cid:2)(cid:15)(cid:4)(cid:16)(cid:15)(cid:8)(cid:14)(cid:15)(cid:6)(cid:7)(cid:17)(cid:17)(cid:17)
`
`
`
`
`DECLARATION OF GORDON MACPHERSON
`
`I, Gordon MacPherson, am over twenty-one (21) years of age. I have never been
`convicted of a felony, and I am fully competent to make this declaration. I declare the following
`to be true to the best of my knowledge, information and belief:
`
`1.
`
`2.
`
`3.
`
`I am Director Board Governance & IP Operations of The Institute of Electrical and
`Electronics Engineers, Incorporated (“IEEE”).
`
`IEEE is a neutral third party in this dispute.
`
`I am not being compensated for this declaration and IEEE is only being reimbursed
`for the cost of the article I am certifying.
`
`4. Among my responsibilities as Director Board Governance & IP Operations, I act as a
`custodian of certain records for IEEE.
`
`5.
`
`I make this declaration based on my personal knowledge and information contained
`in the business records of IEEE.
`
`6. As part of its ordinary course of business, IEEE publishes and makes available
`technical articles and standards. These publications are made available for public
`download through the IEEE digital library, IEEE Xplore.
`
`7.
`
`It is the regular practice of IEEE to publish articles and other writings including
`article abstracts and make them available to the public through IEEE Xplore. IEEE
`maintains copies of publications in the ordinary course of its regularly conducted
`activities.
`
`8. The article below has been attached as Exhibit A to this declaration:
`
`A.
`
`I.J. Cox, et al.; “Secure spread spectrum watermarking for multimedia”,
`IEEE Transactions on Image Processing, Vol. 6, Issue 12, December 1997.
`
`9.
`
`I obtained a copy of Exhibit A through IEEE Xplore, where it is maintained in the
`ordinary course of IEEE’s business. Exhibit A is a true and correct copy of the
`Exhibit, as it existed on or about September 6, 2022.
`
`10. The article and abstract from IEEE Xplore shows the date of publication. IEEE
`Xplore populates this information using the metadata associated with the publication.
`
`445 Hoes Lane Piscataway, NJ 08854
`1
`
`Sony Exhibit 1056
`Sony v. MZ Audio
`
`

`

`(cid:15)(cid:26)(cid:20)(cid:28)(cid:19)(cid:23)(cid:22)(cid:25)(cid:1)(cid:16)(cid:25)(cid:29)(cid:21)(cid:24)(cid:26)(cid:27)(cid:21)(cid:1)(cid:18)(cid:15)(cid:12)(cid:1)(cid:10)(cid:5)(cid:13)(cid:4)(cid:14)(cid:4)(cid:8)(cid:3)(cid:2)(cid:17)(cid:10)(cid:14)(cid:3)(cid:2)(cid:6)(cid:14)(cid:10)(cid:11)(cid:2)(cid:14)(cid:10)(cid:9)(cid:8)(cid:2)(cid:15)(cid:4)(cid:16)(cid:15)(cid:8)(cid:14)(cid:15)(cid:6)(cid:7)(cid:17)(cid:17)(cid:17)
`
`11. I.J. Cox, et al.; “Secure spread spectrum watermarking for multimedia” was published
`in IEEE Transactions on Image Processing, Vol. 6, Issue 12. IEEE Transactions on
`Image Processing, Vol. 6, Issue 12 was published in December 1997. Copies of this
`publication was made available no later than the last day of the publication month.
`The article is currently available for public download from the IEEE digital library,
`IEEE Xplore.
`
`12. The article is currently available for public download from the IEEE digital library,
`IEEE Xplore.
`
`13. I hereby declare that all statements made herein of my own knowledge are true and
`that all statements made on information and belief are believed to be true, and further
`that these statements were made with the knowledge that willful false statements and
`the like are punishable by fine or imprisonment, or both, under 18 U.S.C. § 1001.
`
`I declare under penalty of perjury that the foregoing statements are true and correct.
`
`Executed on:
`
`(cid:5)(cid:1)(cid:4)(cid:1)(cid:3)(cid:2)(cid:3)(cid:3)
`
`2
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`EXHIBIT A
`
`DocuSign Envelope ID: 83A2B261-F8B1-4B89-B876-D2ED6BD45FFF
`
`

`

`IEEE.org
`
`IEEE Xplore
`
`IEEE SA
`
`IEEE Spectrum
`
`More Sites
`
`SUBSCRIBE
`
`SUBSCRIBE
`
`Cart
`
`
`Create
`Account
`
`
`Perso
`Sign
`
`
`
`Browse  My Settings  Help 
`
`Institutional Sign In
`
`Institutional Sign In
`
`All
`
`
`
`
`
`ADVANCED SEARCH
`
`Journals & Magazines > IEEE Transactions on Image Pr... > Volume: 6 Issue: 12 
`
`Secure spread spectrum watermarking for multimedia
`Publisher: IEEE
`
`Cite This
`
` PDF
`
`I.J. Cox ; J. Kilian ; F.T. Leighton ; T. Shamoon All Authors
`
`3551
`Paper
`Citations
`
`220
`Patent
`Citations
`
`7274
`Full
`Text Views
`
`   
`Alerts
`
`Manage Content Alerts
`
`Add to Citation Alerts
`
`Abstract
`
`Authors
`
`References
`
`Citations
`
`Keywords
`
`Metrics
`
`More Like This
`
`Abstract:This paper presents a secure (tamper-resistant) algorithm for
`watermarking images, and a methodology for digital watermarking that may be
`generalized to audio, video, and... View more
`
` Metadata
`Abstract:
`This paper presents a secure (tamper-resistant) algorithm for watermarking
`images, and a methodology for digital watermarking that may be generalized to
`audio, video, and multimedia data. We advocate that a watermark should be
`constructed as an independent and identically distributed (i.i.d.) Gaussian
`random vector that is imperceptibly inserted in a spread-spectrum-like fashion
`into the perceptually most significant spectral components of the data. We
`argue that insertion of a watermark under this regime makes the watermark
`robust to signal processing operations (such as lossy compression, filtering,
`digital-analog and analog-digital conversion, requantization, etc.), and common
`geometric transformations (such as cropping, scaling, translation, and rotation)
`provided that the original image is available and that it can be successfully
`registered against the transformed watermarked image. In these cases, the
`watermark detector unambiguously identifies the owner. Further, the use of
`Gaussian noise, ensures strong resilience to multiple-document, or collusional,
`attacks. Experimental results are provided to support these claims, along with
`an exposition of pending open problems.
`
`
`
` D
`
`ownl
`
`PDF
`
`A-1
`
`More
`Like
`This
`Secure Authentication using Image
`Processing and Visual Cryptography for
`Banking Applications
`2008 16th International Conference on
`Advanced Computing and Communications
`Published: 2008
`Visual cryptography and image processing
`based approach for secure transactions in
`banking sector
`2017 2nd International Conference on
`Telecommunication and Networks (TEL-NET)
`Published: 2017
`Show
`More
`

`

`Published in: IEEE Transactions on Image Processing ( Volume: 6 , Issue: 12,
`December 1997)
`
`Page(s): 1673 - 1687
`
`INSPEC Accession Number: 5778746
`
`Date of Publication: December 1997
`
`DOI: 10.1109/83.650120
`
`Publisher: IEEE
`
` 
`
`ISSN Information:
`
`PubMed ID: 18285237
`
`Authors
`
`References
`
`Citations
`
`Keywords
`
`Metrics
`
`
`
`
`
`
`
`
`
`
`
`IEEE Personal Account
`
`Purchase Details
`
`Profile Information
`
`Need Help?
`
`CHANGE
`USERNAME/PASSWORD
`
`PAYMENT OPTIONS
`
`VIEW PURCHASED
`DOCUMENTS
`
`COMMUNICATIONS
`PREFERENCES
`
`PROFESSION AND
`EDUCATION
`
`US & CANADA: +1 800 678
`4333
`
`WORLDWIDE: +1 732 981
`0060
`
`TECHNICAL INTERESTS
`
`CONTACT & SUPPORT
`
`Follow
`
`  
`
`About IEEE Xplore | Contact Us | Help | Accessibility | Terms of Use | Nondiscrimination Policy | IEEE Ethics Reporting  | Sitemap |
`Privacy & Opting Out of Cookies
`A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of
`humanity.
`
`© Copyright 2022 IEEE - All rights reserved.
`
`IEEE Account
`
`Purchase Details
`
`Profile Information
`
`Need Help?
`
`» Change Username/Password
`» Update Address
`
`» Payment Options
`» Order History
`» View Purchased Documents
`
`» Communications Preferences
`» Profession and Education
`» Technical Interests
`
`» US & Canada: +1 800 678 4333
`» Worldwide: +1 732 981 0060
`» Contact & Support
`
`About IEEE Xplore Contact Us
`
`
`|
`
`|
`
`Help
`
`
`|
`
`Accessibility
`
`
`|
`
`Terms of Use
`
`
`|
`
`Nondiscrimination Policy
`
`
`|
`
`Sitemap
`
`
`|
`
`Privacy & Opting Out of Cookies
`
`A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity.
`© Copyright 2022 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.
`
`A-2
`
`

`

`IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 6, NO. 12, DECEMBER 1997
`
`1673
`
`Secure Spread Spectrum
`Watermarking for Multimedia
`
`Ingemar J. Cox, Senior Member, IEEE, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, Member, IEEE
`
`Abstract—This paper presents a secure (tamper-resistant) al-
`gorithm for watermarking images, and a methodology for digital
`watermarking that may be generalized to audio, video, and
`multimedia data. We advocate that a watermark should be
`constructed as an independent and identically distributed (i.i.d.)
`Gaussian random vector that is imperceptibly inserted in a
`spread-spectrum-like fashion into the perceptually most signifi-
`cant spectral components of the data. We argue that insertion of
`a watermark under this regime makes the watermark robust to
`signal processing operations (such as lossy compression, filtering,
`digital-analog and analog-digital conversion, requantization, etc.),
`and common geometric transformations (such as cropping, scal-
`ing, translation, and rotation) provided that the original image
`is available and that it can be succesfully registered against the
`transformed watermarked image. In these cases, the watermark
`detector unambiguously identifies the owner. Further, the use of
`Gaussian noise, ensures strong resilience to multiple-document, or
`collusional, attacks. Experimental results are provided to support
`these claims, along with an exposition of pending open problems.
`
`Index Terms— Intellectual property, fingerprinting, multime-
`dia, security, steganography, watermarking.
`
`I. INTRODUCTION
`
`THE PROLIFERATION of digitized media (audio, image,
`
`and video) is creating a pressing need for copyright
`enforcement schemes that protect copyright ownership. Con-
`ventional cryptographic systems permit only valid keyholders
`access to encrypted data, but once such data is decrypted
`there is no way to track its reproduction or retransmission.
`Therefore, conventional cryptography provides little protection
`against data piracy, in which a publisher is confronted with
`unauthorized reproduction of information. A digital watermark
`is intended to complement cryptographic processes. It is a
`visible, or preferably invisible,
`identification code that
`is
`permanently embedded in the data and remains present within
`
`Manuscript received January 14, 1996; revised January 24, 1997. Portions
`of this work were reprinted, with permission, from the Proceedings of the
`IEEE Conference on Image Processing, 1996, and from the Proceedings of
`the First International Conference on Data Hiding (Springer-Verlag, 1996).
`The associate editor coordinating the reivew of this manuscript and approving
`it for publication was Prof. Sarah Rajala.
`I. J. Cox and J. Kilian are with NEC Research Institute, Princeton, NJ 08540
`USA (e-mail: ingemar@research.nj.nec.com; joe@research.nj.nec.com).
`F. T. Leighton is with the Mathematics Department and Laboratory for
`Computer Science, The Massachusetts Institute of Technology, Cambridge,
`MA 02139 USA (e-mail: ftl@math.mit.edu).
`T. Shamoon is with InterTrust STAR Laboratory, Sunnyvale, CA 94086
`USA (e-mail: talal@intertrust.com).
`Publisher Item Identifier S 1057-7149(97)08460-1.
`
`the data after any decryption process. In the context of
`this work, data refers to audio (speech and music), images
`(photographs and graphics), and video (movies). It does not
`include ASCII representations of text, but does include text
`represented as an image. Many of the properties of the scheme
`presented in this work may be adapted to accommodate audio
`and video implementations, but the algorithms here specifically
`apply to images.
`A simple example of a digital watermark would be a
`visible “seal” placed over an image to identify the copyright
`owner (e.g., [2]). A visible watermark is limited in many
`ways. It marrs the image fidelity and is susceptible to attack
`through direct image processing. A watermark may contain
`additional information, including the identity of the purchaser
`of a particular copy of the material. In order to be effective, a
`watermark should have the characteristics outlined below.
`Unobtrusiveness: The watermark should be perceptually
`invisible, or its presence should not interfere with the work
`being protected.
`Robustness: The watermark must be difficult (hopefully
`impossible) to remove. If only partial knowledge is available
`(for example, the exact location of the watermark in an image
`is unknown), then attempts to remove or destroy a watermark
`should result
`in severe degradation in fidelity before the
`watermark is lost. In particular, the watermark should be robust
`in the following areas.
`
`• Common signal processing: The watermark should still
`be retrievable even if common signal processing oper-
`ations are applied to the data. These include, digital-
`to-analog and analog-to-digital conversion, resampling,
`requantization (including dithering and recompression),
`and common signal enhancements to image contrast and
`color, or audio bass and treble, for example.
`• Common geometric distortions (image and video data):
`Watermarks in image and video data should also be im-
`mune from geometric image operations such as rotation,
`translation, cropping and scaling.
`• Subterfuge attacks (collusion and forgery): In addition,
`the watermark should be robust to collusion by multiple
`individuals who each possess a watermarked copy of
`the data. That is, the watermark should be robust to
`combining copies of the same data set to destroy the
`watermarks. Further, if a digital watermark is to be used in
`litigation, it must be impossible for colluders to combine
`their images to generate a different valid watermark with
`the intention of framing a third party.
`
`1057–7149/97$10.00 ª
`
`1997 IEEE
`
`Authorized licensed use limited to: Everything Demo User. Downloaded on September 06,2022 at 12:43:08 UTC from IEEE Xplore. Restrictions apply.
`
`

`

`1674
`
`IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 6, NO. 12, DECEMBER 1997
`
`Universality: The same digital watermarking algorithm
`should apply to all three media under consideration. This
`is potentially helpful
`in the watermarking of multimedia
`products. Also, this feature is conducive to implementation of
`audio and image/video watermarking algorithms on common
`hardware.
`Unambiguousness: Retrieval of the watermark should un-
`ambiguously identify the owner. Furthermore, the accuracy of
`owner identification should degrade gracefully in the face of
`attack.
`There are two parts to building a strong watermark: the
`watermark structure and the insertion strategy. In order for
`a watermark to be robust and secure, these two components
`must be designed correctly. We provide two key insights that
`make our watermark both robust and secure: We argue that
`the watermark be placed explicitly in the perceptually most
`significant components of the data, and that the watermark
`be composed of random numbers drawn from a Gaussian
`distribution.
`The stipulation that the watermark be placed in the per-
`ceptually significant components means that an attacker must
`target
`the fundamental structural components of the data,
`thereby heightening the chances of fidelity degradation. While
`this strategy may seem counterintuitive from the point of
`view of steganography (how can these components hide any
`signal?), we discovered that the significant components have
`a perceptual capacity that allows watermark insertion without
`perceptual degradation. Further, most processing techniques
`applied to media data tend to leave the perceptually significant
`components intact. While one may choose from a variety of
`such components, in this paper, we focus on the perceptually
`significant spectral components of the data. This simultane-
`ously yields high perceptual capacity and achieves a uniform
`spread of watermark energy in the pixel domain.
`The principle underlying our watermark structuring strategy
`is that the mark be constructed from independent, identically
`distributed (i.i.d.) samples drawn from a Gaussian distribu-
`tion. Once the significant components are located, Gaussian
`noise is injected therein. The choice of this distribution gives
`resilient performance against collusion attacks. The Gaussian
`watermark also gives our scheme strong performance in the
`face of quantization, and may be structured to provide low
`false positive and false negative detection. This is discussed
`below, and elaborated on in [13].
`Finally, note that the techniques presented herein do not
`provide proof of content ownership on their own. The focus
`of this paper are algorithms that insert messages into content
`in an extremely secure and robust fashion. Nothing prevents
`someone from inserting another message and claiming owner-
`ship. However, it is possible to couple our methods with strong
`authentication and other cryptographic techniques in order to
`provide complete, secure and robust owner identification and
`authentication.
`Section III begins with a discussion of how common sig-
`nal transformations, such as compression, quantization, and
`manipulation, affect the frequency spectrum of a signal. This
`discussion motivates our belief that a watermark should be
`embedded in the data’s perceptually significant frequency
`
`the major problem then becomes
`components. Of course,
`how to imperceptibly insert a watermark into perceptually
`significant components of the frequency spectrum. Section III-
`A proposes a solution based on ideas from spread spectrum
`communications. In particular, we present a watermarking
`algorithm that relies on the use of the original image to extract
`the watermark. Section IV provides an analysis based on pos-
`sible collusion attacks that indicates that a binary watermark
`is not as robust as a continuous one. Furthermore, we show
`that a watermark structure based on sampling drawn from
`multiple i.i.d Gaussian random variables offers good protection
`against collusion. Ultimately, no watermarking system can be
`made perfect. For example, a watermark placed in a textual
`image may be eliminated by using optical character recogni-
`tion technology. However, for common signal and geometric
`distortions, the experimental results of Section V suggest that
`our system satisfies most of the properties discussed in the
`introduction, and displays strong immunity to a variety of
`attacks in a collusion resistant manner. Finally, Section VI
`discusses possible weaknesses and potential enhancements to
`the system and describes open problems and subsequent work.
`
`II. PREVIOUS WORK
`Several previous digital watermarking methods have been
`proposed. Turner [25] proposed a method for inserting an
`identification string into a digital audio signal by substituting
`the “insignificant” bits of randomly selected audio samples
`with the bits of an identification code. Bits are deemed
`“insignificant” if their alteration is inaudible. Such a system
`is also appropriate for two-dimensional (2-D) data such as
`images, as discussed in [26]. Unfortunately, Turner’s method
`may easily be circumvented. For example, if it is known that
`the algorithm only affects the least significant two bits of a
`word, then it is possible to randomly flip all such bits, thereby
`destroying any existing identification code.
`Caronni [6] suggests adding tags—small geometric pat-
`terns—to digitized images at brightness levels that are imper-
`ceptible. While the idea of hiding a spatial watermark in an
`image is fundamentally sound, this scheme may be susceptible
`to attack by filtering and redigitization. The fainter such
`watermarks are, the more susceptible they are such attacks
`and geometric shapes provide only a limited alphabet with
`which to encode information. Moreover, the scheme is not
`applicable to audio data and may not be robust to common
`geometric distortions, especially cropping.
`Brassil et al. [4] propose three methods appropriate for
`document images in which text is common. Digital watermarks
`are coded by 1) vertically shifting text lines, 2) horizontally
`shifting words, or 3) altering text features such as the vertical
`endlines of individual characters. Unfortunately, all
`three
`proposals are easily defeated, as discussed by the authors.
`Moreover, these techniques are restricted exclusively to images
`containing text.
`Tanaka et al. [19], [24] describe several watermarking
`schemes that rely on embedding watermarks that resemble
`quantization noise. Their ideas hinge on the notion that quan-
`tization noise is typically imperceptible to viewers. Their
`
`Authorized licensed use limited to: Everything Demo User. Downloaded on September 06,2022 at 12:43:08 UTC from IEEE Xplore. Restrictions apply.
`
`

`

`COX et al.: SPREAD SPECTRUM WATERMARKING
`
`1675
`
`first scheme injects a watermark into an image by using
`a predetermined data stream to guide level selection in a
`predictive quantizer. The data stream is chosen so that the
`resulting image looks like quantization noise. A variation
`on this scheme is also presented, where a watermark in the
`form of a dithering matrix is used to dither an image in a
`certain way. There are several drawbacks to these schemes.
`The most
`important
`is that
`they are susceptible to signal
`processing, especially requantization, and geometric attacks
`such as cropping. Furthermore, they degrade an image in the
`same way that predictive coding and dithering can.
`In [24], the authors also propose a scheme for watermarking
`facsimile data. This scheme shortens or lengthens certain runs
`of data in the run length code used to generate the coded fax
`image. This proposal is susceptible to digital-to-analog and
`analog-to-digital attacks. In particular, randomizing the least
`significant bit (LSB) of each pixel’s intensity will completely
`alter the resulting run length encoding. Tanaka et al. also
`propose a watermarking method for “color-scaled picture
`and video sequences”. This method applies the same signal
`transform as the Joint Photographers Expert Group (JPEG)
`8 subblocks of an image) and
`(discrete cosine transform of 8
`embeds a watermark in the coefficient quantization module.
`While being compatible with existing transform coders, this
`scheme may be susceptible to requantization and filtering and
`is equivalent to coding the watermark in the LSB’s of the
`transform coefficients.
`In a recent paper, Macq and Quisquater [18] briefly discuss
`the issue of watermarking digital images as part of a general
`survey on cryptography and digital television. The authors
`provide a description of a procedure to insert a watermark
`into the least significant bits of pixels located in the vicinity
`of image contours. Since it relies on modifications of the least
`significant bits, the watermark is easily destroyed. Further,
`their method is restricted to images, in that it seeks to insert the
`watermark into image regions that lie on the edge of contours.
`Bender et al. [3] describe two watermarking schemes. The first
`is a statistical method called patchwork. Patchwork randomly
`chooses
`pairs of image points,
`, and increases the
`by one unit while correspondingly decreasing
`brightness at
`. The expected value of the sum of the
`the brightness of
`differences of the
`pairs of points is then
`, provided certain
`statistical properties of the image are true.
`The second method is called “texture block coding,”
`wherein a region of random texture pattern found in the
`image is copied to an area of the image with similar texture.
`Autocorrelation is then used to recover each texture region.
`The most significant problem with this technique is that it is
`only appropriate for images that possess large areas of random
`texture. The technique could not be used on images of text,
`for example, nor is there a direct analog for audio.
`Rhoads [21] describes a method that adds or subtracts small
`random quantities from each pixel. Addition or subtraction is
`determined by comparing a binary mask of
`bits with the
`LSB of each pixel. If the LSB is equal to the corresponding
`mask bit, then the random quantity is added, otherwise it is
`subtracted. The watermark is subtracted by first computing
`the difference between the original and watermarked images
`
`and then by examining the sign of the difference, pixel by
`pixel, to determine if it corresponds to the original sequence
`of additions and subtractions. This method does not make
`use of perceptual relevance, but it is proposed that the high
`frequency noise be prefiltered to provide some robustness to
`lowpass filtering. This scheme does not consider the problem
`of collusion attacks.
`Koch, Rindfrey, and Zhao [14] propose two general methods
`for watermarking images. The first method, attributed to Scott
`Burgett, breaks up an image into 8
`8 blocks and computes
`the discrete cosine transform (DCT) of each of these blocks.
`A pseudorandom subset of the blocks is chosen, then, in each
`such block, a triple of frequencies is selected from one of
`18 predetermined triples and modified so that their relative
`strengths encode a one or zero value. The 18 possible triples
`are composed by selection of three out of eight predetermined
`frequencies within the 8
`8 DCT block. The choice of
`the eight frequencies to be altered within the DCT block is
`based on a belief that the “middle frequencies...have moderate
`variance,” i.e. they have similar magnitude. This property is
`needed in order to allow the relative strength of the frequency
`triples to be altered without requiring a modification that
`would be perceptually noticeable. Superficially, this scheme is
`similar to our own proposal, also drawing an analogy to spread
`spectrum communications. However,
`the structure of their
`watermark is different from ours, and the set of frequencies
`is not chosen based on any direct perceptual significance, or
`relative energy considerations. Further, because the variance
`between the eight frequency coefficients is small, one would
`expect
`that
`their technique may be sensitive to noise or
`distortions. This is supported by the experimental results that
`report that the “embedded labels are robust against JPEG
`compression for a quality factor as low as about 50%.” By
`comparison, we demonstrate that our method performs well
`with compression quality factors as low as 5%. An earlier
`proposal by Koch and Zhao [15] used not triples of frequencies
`but pairs of frequencies, and was again designed specifically
`for robustness to JPEG compression. Nevertheless, they state
`that “a lower quality factor will increase the likelihood that
`the changes necessary to superimpose the embedded code on
`the signal will be noticeably visible.” In a second method,
`designed for black and white images, no frequency transform
`is employed. Instead, the selected blocks are modified so that
`the relative frequency of white and black pixels encodes the
`final value. Both watermarking procedures are particularly
`vulnerable to multiple document attacks. To protect against
`this, Zhao and Koch propose a distributed 8
`8 block created
`by randomly sampling 64 pixels from the image. However, the
`resulting DCT has no relationship to that of the true image and
`consequently may be likely to cause noticeable artifacts in the
`image and be sensitive to noise.
`In addition to direct work on watermarking images, there are
`several works of interest in related areas. Adelson [1] describes
`a technique for embedding digital information in an analog
`signal for the purpose of inserting digital data into an analog
`TV signal. The analog signal is quantized into one of two
`disjoint ranges (
`, for example) that
`are selected based on the binary digit to be transmitted. Thus,
`
`Authorized licensed use limited to: Everything Demo User. Downloaded on September 06,2022 at 12:43:08 UTC from IEEE Xplore. Restrictions apply.
`
`

`

`1676
`
`IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 6, NO. 12, DECEMBER 1997
`
`Adelson’s method is equivalent to watermark schemes that
`encode information into the LSB’s of the data or its transform
`coefficients. Adelson recognizes that the method is susceptible
`to noise and therefore proposes an alternative scheme wherein
`a 2
`1 Hadamard transform of the digitized analog signal is
`taken. The differential coefficient of the Hadamard transform
`is offset by zero or one unit prior to computing the inverse
`transform. This corresponds to encoding the watermark into
`the least significant bit of the differential coefficient of the
`Hadamard transform. It is not clear that this approach would
`demonstrate enhanced resilience to noise. Furthermore, like all
`such LSB schemes, an attacker can eliminate the watermark
`by randomization.
`Schreiber et al. [22] describe a method to interleave a
`standard NTSC signal within an enhanced definition televi-
`sion (EDTV) signal. This is accomplished by analyzing the
`frequency spectrum of the EDTV signal (larger than that of
`the NTSC signal) and decomposing it into three subbands (L,
`M, H for low-, medium- and high-frequency, respectively). In
`contrast, the NTSC signal is decomposed into two subbands,
`L and M. The coefficients,
`, within the M band are
`quantized into
`levels and the high frequency coefficients,
`, of the EDTV signal are scaled such that the addition
`of the
`signal plus any noise present in the system is
`less than the minimum separation between quantization levels.
`Once more, the method relies on modifying least significant
`bits. Presumably, the midrange rather than low frequencies
`were chosen because these are less perceptually significant.
`In contrast,
`the method proposed here modifies the most
`perceptually significant components of the signal.
`Finally, it should be noted that existing techniques are gen-
`erally not resistant to collusion attacks by multiple documents.
`
`III. WATERMARKING IN THE FREQUENCY DOMAIN
`In order to understand the advantages of a frequency-based
`method, it is instructive to examine the processing stages that
`an image (or sound) may undergo in the process of copying,
`and to study the effect that these stages could have on the data,
`as illustrated in Fig. 1. In the figure, “transmission” refers to
`the application of any source or channel code, and/or standard
`encryption technique to the data. While most of these steps
`are information lossless, many compression schemes (JPEG,
`MPEG, etc.) are lossy, and can potentially degrade the data’s
`quality, through irretrievable loss of information. In general,
`a watermarking scheme should be resilient to the distortions
`introduced by such algorithms.
`Lossy compression is an operation that usually eliminates
`perceptually nonsalient components of an image or sound.
`Most processing of this sort takes place in the frequency
`domain. In fact, data loss usually occurs among the high-
`frequency components.
`After receipt, an image may endure many common transfor-
`mations that are broadly categorized as geometric distortions
`or signal distortions. Geometric distortions are specific to
`images and video, and include such operations as rotation,
`translation, scaling and cropping. By manually determining a
`minimum of four or nine corresponding points between the
`
`Fig. 1. Common processing operations that a media document could un-
`dergo.
`
`original and the distorted watermark, it is possible to remove
`any two or three-dimensional (3-D) affine transformation [8].
`However, an affine scaling (shrinking) of the image leads to
`a loss of data in the high-frequency spectral regions of the
`image. Cropping, or the cutting out and removal of portions of
`an image, leads to irretrievable loss of image data, which may
`seriously degrade any spatially based watermark such as [6].
`However, a frequency-based scheme spreads the watermark
`over the whole spatial extent of the image, and is therefore
`less likely to be affected by cropping, as demonstrated in
`Section V-E.
`Common signal distortions include digital-to-analog and
`analog-to-digital conversion, resampling, requantization, in-
`cluding dithering and recompression, and common signal
`enhancements to image contrast and/or color, and audio fre-
`quency equalization. Many of these distortions are nonlinear,
`and it is difficult to analyze their effect in either a spatial- or
`frequency-based method. However, the fact that the original
`image is known allows many signal transformations to be
`undone, at least approximately. For example, histogram equal-
`ization, a common nonlinear contrast enhancement method,
`may be removed substantially by histogram specification [10]
`or dynamic histogram warping [7] techniques.
`Finally, the copied image may not remain in digital form.
`Instead, it is likely

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket