throbber
US006101602A
`6,101,602
`[11] Patent Number:
`United States Patent 15
`
`Fridrich
`[45] Date of Patent:
`Aug. 8, 2000
`
`[54] DIGITAL WATERMARKING BY ADDING
`RANDOM, SMOOTH PATTERNS
`
`[75]
`
`Inventor:
`
`Jiri Fridrich, Johnson City, N-Y.
`
`[73] Assignee: The United States of America as
`represented by the Secretary of the
`Air Force, Washington, D.C.
`
`[21] Appl. No.: 08/986,695
`
`[22]
`
`Filed:
`
`Dec. 8, 1997
`
`[SL] Ut, C0 cece cceeccccecsssesesssecessecssseessieeesseess HO4L 9/00
`[52] U.S. C1. eee cecseescsesesescnesnesssnsensensneseesens 713/176
`[58] Field of Search oe 380/4, 5, 28, 51,
`380/54, 43, 48, 200, 201, 263; 713/176,
`168
`
`[56]
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`11/1994 GutowitZ oo. ects ceceeeeeee 380/43
`5,365,589
`3/1997 Coopermanetal.
`.... 380/28
`5,613,004
`5,680,462 10/1997 Miller et al. 0.0...
`ws 380/48
`5,687,236
`11/1997 Moskowitz et al.
`...
`. 380/28
`5,825,892 10/1998 Braudawayetal. ...
`. 380/51
`5,859,920
`1/1999 Daly et al.
`.........
`.. 382/115
`5,889,868
`3/1999 Moskowitz et al.
`we 380/51
`5,915,027
`6/1999 Cox et al.
`ciccececcesseersetereeeeneee 380/54
`
`
`
`
`OTHER PUBLICALIONS
`
`Walter Bender, Daniel Gruhl, & Norishige Morimoto,
`“Techniques for Data Hiding”, Massachussetts Institute of
`Technology, Media Lab, Cambridge MA 02139 (23 pages).
`Ingemar
`J. Cox, Joe Kilian, Tom Leighton, & Talal
`Shamoon,“Secure Spread Spectrum Watermarking for Mul-
`timedia”, NEC Research Institute Technical Rpt 95-10 (33
`pages).
`Primary Examiner—Jod B. Swann
`Assistant Examiner—Matthew Smithers
`
`Attorney, Agent, or Firm—Harold 1.. Burstyn
`
`[57]
`
`ABSTRACT
`
`A digital image is “watermarked”, that is, authenticated by
`an embeddedpattern. The pattern is created by hashing the
`image and adding a signature element. Manipulating this
`result by the seed for a random numbergenerator leads to an
`initial
`two dimensional random black-and-white pattern.
`This pattern is manipulated by a cellular automaton and
`smoothed before being added to the original
`image. To
`determine whether the image is authentic, one retrieves the
`watermark by subtracting the watermarked image from the
`original to obtain the difference. The value of the correlation
`between the difference thus obtained and the smoothed
`
`pattern determines the presence or absence of the water-
`mark.
`
`22 Claims, 4 Drawing Sheets
`
` ‘en 7
`
`
`Original image M
`
`Image digest function H
`——_
`
`Author’s ID
`
`Coc
`
`Seed fora RNG
`
`
`
`Cellular
`
`automaton
`
`Low frequency content
`watermark pattern
`
`Coalesced random image
`
`Initial random image
`
`Pattern overlaying
`
`
`
`Watermarked image
`
`Sony Exhibit 1048
`Sony Exhibit 1048
`Sony v. MZ Audio
`Sony v. MZ Audio
`
`

`

`
`
`
`
`yusyed“SN
`
`0007‘8“sny
`bJOT9Y§
`
`Z09‘TOT'9
`
`

`

`
`
`
`
`
`
`U.S.PatentAug.8,2000Sheet2of46,101,602q
`
`
`

`

`Author's ID
`f | (MM)41D|4
`
`
`
`yuajed“SN
`
`0007‘8“sny
`bJO¢JOYS
`
`Low frequency content Coalesced random image_Initial random image
`
`watermark pattern
`
`Pattern overlaying
`
`
`
`Z09‘TOT'9
`
` Image digest function H
`automaton #& by
`
`
`Original image M
`
`Seed for a RNG
`

`
`e
`
`Smoothing
`
`Cellular
`
`? i
`
`~
`os
`ne
`at
`ae
`es at]
`+rr ae ane
`oy
`nn
`wouter
`UF
`
`

`

`Original
`
`unwatermarked yuajed‘SN
`
`
`0007‘8“sny
`PJ0pPOTS
`
`
`
`
`Calculate
`Modified
`
`
`
`the difference
`watermarked
`
`
`image U
`
`
`image M
`X=M-U
`
`
`
`Discrete cosine
`
`transformation
`
`D = DCT(X)
`
`
`
`
`
`
`
`
`
`
`
`Watermark
`Watermark
`
`Correlation > 0.2?
`IS
`is not
`
`
`
`present
`present
`
`Calculate the correlation between the lowest 1024
`DCTcoefficients of the watermarked pattern
`and
`the lowest 1024 DCT coefficients of D
`
`Z09‘TOT'9
`
`

`

`6,101,602
`
`1
`DIGITAL WATERMARKINGBY ADDING
`RANDOM, SMOOTH PATTERNS
`
`STATEMENT OF GOVERNMENT INTEREST
`
`The invention described herein may be manufactured and
`used by or for the Government for governmental purposes
`without the payment of any royalty thereon.
`
`BACKGROUND OF THE INVENTION
`
`invention relates to authenticating digital
`The present
`data, especially digital images, and, in particular, relates to
`authenticating such data by means of embedded code that
`functions to authenticate the data in a manner similar to that
`of a watermark in a piece of paper.
`Digital images, digital video, soundtracks, and any other
`documents or files in an electronic format can be easily
`copied. Even though such copying may violate copyright
`laws, it is widespread. The ease with which electronic files
`may be copied without loss of content significantly contrib-
`utes to illegal copying.
`Furthermore, a recipient of even a lawfully transmitted
`digital document may need to authenticate it. That is, the
`recipient must determine that the document came from the
`person whois alleged to have sent it and not from someone
`trying to masquerade as that person. (Such falsification of
`the sender’s identity is knownas spoofing.) One can authen-
`ticate a communication by classical cryptographic means,
`such as combining a public-key system with a hash function.
`With digital watermarking one can distribute a document
`without encryption. Thus digital watermarking is especially
`useful
`for protecting property rights in images, video-
`streams, and audio tracks. The watermark is embedded in the
`image and not just appended appended to the document, as
`a cryptographic signature is. The watermark stays in the
`document as long as the document is recognizable. There-
`fore one can prove that an image, whetherstill or moving,
`or a phonorecord is an unauthorized copyor derivative work
`of a copyrighted work.
`These problemsof preserving the rights of authors and of
`assuring recipients that they have not been spoofedraise the
`question of authenticating digital data. Can a method be
`found to sign or mark the electronic documentto indicate its
`origin unambiguously? Can such a sign or mark be protected
`against tampering?
`An electronic document can be signed or marked either by
`public-key encryption or digital watermarks. The present
`invention is directed to methods of authentication based on
`digital watermarks. Such a watermark must be embedded in
`the document in an invisible form. That is, it should not
`interfere with the content of the original, and adding a
`watermark to a document should not cause any visible
`artifacts to appear.
`The most important requirementfor digital watermarksis
`that they be robust with respect to common procedures of
`image processing. Such procedures include kernel filtering,
`lossy compression, conversion between digital and analog
`format, resampling, cropping,affine transforming, removing
`or adding features, adding noise, copying, and scanning.
`The second important requirementfor digital watermarks
`is that they be non-removable even with a complete knowl-
`edge of the watermarking algorithm. This requirement can
`be met if the algorithm for embedding the watermark is
`made cryptographically strong by meansofa secret key.
`The purpose of a digital watermark is to prove the
`ownership of digital data. A pirate may crop some small
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`portion of the image, adjust colors, brightness, change the
`resolution, and apply variousfilters. Such modifications will
`of course disturb the watermark. Nevertheless, so long as the
`original portion of the image is recognizable, the watermark
`should be detectable by using sophisticated algorithms. The
`detection itself is an algorithmic process that depends on a
`secret password chosen by the document’s author.
`To prove that a watermark is present in an image, one
`must show that a certain relationship among pixels (the
`reconstructed watermark) can occur by chance with an
`extremely low probability.
`It should be computationally
`infeasible to remove the watermark, even with complete
`knowledge of the watermarking algorithm, unless one has
`the secret password. In other words, breaking the watermark
`should be nearly impossible without the password even if
`one knows the algorithm. This principle, called after
`Kerckhoff, is commonly accepted in the field of cryptogra-
`phy.
`A robust watermarking algorithm can settle a dispute
`about ownership of a digital document. Let A create a digital
`image and watermark it with his key. If B gets hold of the
`watermarked image to steal it (i.e., claim ownership), the
`best B can do is to embed his watermark into the image and
`claim that he can prove ownership. If the watermark is
`robust, A can prove his ownership to a judge or other
`authority because A can detect his watermark in the image
`marked by B, while B cannot do that for the image that A
`has. Since wetrust that the watermark cannot be completely
`removed unless one modifies the image beyond recognition,
`A proves he ownsthe image. The watermark’s robustness to
`change plays a crucialrole in this dispute, because, if B can
`filter out the original watermark, the watermark is useless.
`The best watermarking algorithms currently available are
`based on spread-spectrum techniques (R. C. Dixon., Spread
`Spectrum Systems with Commercial Applications (New
`York, Wiley, 1994)). Hartung and Girod (“Digital Water-
`marking of Raw and Compressed Video”, Proc. European
`EOS/SPIE Symposium on Advanced Imaging and Network
`Technologies, Berlin, Germany, October 1996) describe
`methods for marking digital video MPEG-2 in a series of
`papers. Their method uses direct sequence encoding in the
`spatial domain. It is well known that any watermarking
`scheme can be interpreted as pattern overlain with a specific
`pattern. In Hartung and Girod’s method, the pattern is a
`linear combination of basis functions that are orthogonalto
`typical images. While this method enables extraction of a
`watermark without the original image, it is less robust with
`respect
`to image modifications. Also,
`their technique is
`vulnerable to collusion attack—averaging several water-
`marked copies of the same document in a hope to “average
`out” the watermark.
`
`W. Bender, D. Gruhl, and N. Morimoto (“Techniques for
`Data Hiding,” 2420 Proc. SPIE 40 (1990)) describe tech-
`niques for hiding data in digital images and audio streams.
`Their patchwork method is a “stochastic” spread-spectrum
`technique in the spatial domain. No image escrow is needed.
`Their method appears to be vulnerable to the collusion
`attack. Another of their methods is called texture block
`
`coding. A small, random-looking area is copied into a
`different random-looking area of the image. This copying
`creates a correlation that will not be disturbed by any
`image-processing operation except cropping. If those areas
`contain an 8x8 square, the method will also be robust with
`respect to JPEG compression of any quality. No image
`escrow is needed. However, the watermark is easy to detect
`and remove. Another disadvantage is that
`it
`is image
`dependent, and notall images will have the required random
`looking areas.
`
`

`

`6,101,602
`
`4
`viav,(1+aw,), i=1, .. . 1000.
`
`The constant @ adjusts the magnitude of modifications. In
`Cox et al.’s experiments, a was chosen to be equal to 0.1.
`To recover the watermark from a modified image,
`the
`modified image is first transformed by a discrete cosine
`transform to obtain modified coefficients {v,;*}. The water-
`mark w* extracted from the modified image is compared to
`the original watermark w with a similarity classification
`function
`
`ww
`sim(w", w) = ——
`lhl]
`
`3
`Pitas and Kaskalis (“Signature Casting on Digital
`Images”, Proc. IEEE Workshop on Nonlinear Signal and
`Image Processing, Neos Marmaras, Halkidiki, Greece, Jun.
`20-22, 1995) have described a method for applying signa-
`tures to digital images. The pixels of a digital image are
`divided into two disjoint sets of the same size. Pixels in one
`set are offset by an amount k while the pixels in the other set
`are left untouched. Although the authors report no robust-
`ness study, the similarity of this technique to the patchwork
`of Bender et al. suggests that the method will have similar
`robustness.
`
`Zhao and Koch (“Embedding Robust Labels Into Images
`For Copyright Protection,” Proc. Int. Congr. on IPR for
`Specialized Information, Knowledge and New Technologies
`(Vienna, Austria, Aug. 21-25, 1995)) propose a watermark
`based on JPEG compression. One bit of information is
`embedded into middle frequencies of pseudo-randomly cho-
`sen 8x8 pixel blocks. In each block, a triple of frequencies
`obtained by discrete cosine transform is chosen out of 18
`predetermined frequencies. Their coefficients are modified
`so that their mutual relationship encodes one bit of infor-
`mation. Since the 18 predetermined frequencies are chosen
`from the middle range, this method will be less robust and
`more vulnerable to noise than the method of Cox etal.
`described below.
`
`Zhao and Koch (“Towards Robust and Hidden Image
`Copyright Labeling,” Proc. IEEE Workshop on Nonlinear
`Signal and Image Processing (Neos Marmaras, Halkidiki,
`Greece, Jun. 20-22, 1995)) describe another method,
`designed for black and white images, where the relative
`frequencies of black and white pixels in pseudo-randomly
`selected 8x8 blocks encode one bit of information. One
`advantage of this schemeis that no image transformation is
`involved. On the other hand, the method is vulnerable to
`collusion of several watermarked images. To overcome this
`problem, Zhao and Koch propose to choose distributed
`blocks instead of square blocks. However, this choice makes
`the method much more sensitive to noise.
`
`M. Kutter et al. (Digital signature of color images using
`amplitude modulation, SPIE-EI97 Proceedings) describe a
`method for digitally signing color images that uses ampli-
`tude modulation. The authors hide the signature in the blue
`channel of a color image because the human visual system
`is least sensitive to the blue channel. Their method is clearly
`more sensitive to noise than are spread-spectrum techniques.
`Cox et al. (Secure Spread Spectrum Watermarking for
`Multimedia, NEC Research Institute, Technical Report
`95-10) introduced an extremely robust watermark which is
`based on discrete cosine transform and modifying the low
`frequencies by a small amount. To recover the watermark,
`one needsthe original image. The authors report that one can
`reliably extract the watermark from images after 5% JPEG
`compression! They also find their technique to be robust
`under resampling, dithering, cropping, and other common
`image manipulations. The watermark is also resistant
`to
`collusion attack (combining multiple watermarked docu-
`ments to remove the watermark).
`The authors make the watermark very robust by inserting
`it into the low frequencies. That is, they make use of the
`relative insensitivity of the human visual system to small,
`gradual changesin intensity. The watermark is a sequence of
`1000 samples from a normaldistribution with zero mean and
`unit variance, {w,}, encoded into 1000 lowest frequency
`coefficients {v,} of the discrete cosine transform using the
`formula
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`Aconclusion whetheror not the modified image contains the
`watermark w is made based on the value of sim. The authors
`describe several improvements that make the watermark
`extraction process more accurate by using robust statistics
`and by preprocessing w* before calculating sim. The water-
`mark is remarkably robust with respect to analog-digital
`conversions,
`requantizing, copying and subsequent
`scanning, dithering, etc. In a more general scheme, instead
`of choosing the lowest 1000 frequencies for the watermark
`embedding,
`the frequencies are chosen from M lowest
`frequencies, where M>N. To wipe out the watermark, one
`would have to randomize the amplitudesof all low frequen-
`cies by the maximum amountallowed bythe algorithm. The
`result, however, would be visible deterioration of the image.
`The authors study the robustness with respect to collusion by
`averaging 5 watermarked images andtesting the presence of
`each watermark in the image.
`to overlaying a pattern
`The watermark is equivalent
`spanned by N discrete cosines over the image. The water-
`mark values are used directly as coefficients of that linear
`combination. The watermark may becomevisible (orat least
`detectable) in those areas of the carrier image which were
`originally uniform or had a uniform brightness gradient.
`(Quite a large percentage of images do contain such areas).
`The watermark cannot be readily removed because the
`discrete cosines do not generally form a set of linearly
`independent functions on proper subsets of the image.
`Nevertheless, one can mount an attack on the watermark.
`Let us assumethat a square area containing K pixels reveals
`some approximation to the watermark. Since we know that
`the watermark is spanned by the lowest 1000 coefficients,
`we can write K equations and thereby narrow down the
`possibilities for the watermark sequence by a large margin.
`In the equation below, f,=(f,,,f,,) denotes the rth 2d
`frequency, and A, denotes the rth unknown coefficient.
`1000
`
`ThrQj+l)
`
`.
`
`.
`
`ij = 2 A,cofWofofBO\ (i, j) € Area
`
`mf Qit I
`
`This information may be utilized to remove the water-
`mark beyond detection.
`Because none of these prior-art methods is foolproof,
`there exists a need for a digital watermark that is completely
`resistant to attack.
`
`SUMMARY OF THE INVENTION
`
`The present invention is a method for injecting invisible
`robust watermarks into digital images. It can be applied to
`gray scale as well as to color images. The method of the
`present invention overcomes some known possible weak-
`nesses in the methods of the prior art.
`
`

`

`6,101,602
`
`5
`invention is to
`Therefore, one object of the present
`provide a method that authenticates digital data, especially
`digital images.
`Another object of the present invention is to provide a
`method that authenticates digital data by means of embed-
`ded code that functions in a manner similar to that of a
`watermark in a piece of paper.
`These and many other objects and advantages of the
`present invention will be readily apparent to one skilled in
`the pertinent art from the following detailed description of a
`preferred embodiment of the invention and the related
`drawings, in which like reference numerals designate the
`same elements.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 shows examples of five watermarking patterns
`whose contrast is enhanced to make the patterns visible.
`FIG. 1A showsan initial random pattern.
`FIG. 1B shows the initial pattern of FIG. 1A after 1
`iteration of a cellular automaton with voting rules.
`FIG. 1C shows the initial pattern of FIG. 1A after 2
`iterations of a cellular automaton with voting rules.
`FIG. 1D shows the initial pattern of FIG. 1A after 5
`iterations of a cellular automaton with voting rules.
`FIG. 1E showsthe initial pattern of FIG. 1A after 35
`iterations of a cellular automaton with voting rules.
`FIG. 2 shows examples of five watermarking patterns
`with enhanced contrast.
`
`FIG. 3 shows an example of embedding a watermark
`within an image.
`FIG. 4 is a flow chart showingthe steps of determining the
`presence or absence of a watermark in an image.
`
`DESCRIPTION OF THE PREFERRED
`EMBODIMENT
`
`The prior-art method of Coxetal. is subject to attack, as
`described above. The attack is based on the fact that the
`watermark is localized in a relatively small number of
`coefficients of a publicly known transformation—the dis-
`crete cosine transformation. If the choice of transformation
`functions was kept secret, this type of attack would not be
`possible.
`To make it practical to hide the choice of transformation
`functions, we would have to design orthogonal function
`bases that depend on parameters, that is, on a secret key.
`Another important requirement is that the computation be
`efficient, similar to fast Fourier type of transforms.
`Another way to overcome the vulnerability of prior-art
`methods of digital watermarking is to view it as pattern
`overlaying. We do not have to use patterns formed by a
`linear combination of discrete cosines. We can substitute
`general key-dependent patterns whose power is concen-
`trated in the low frequencies to guarantee robustness. We
`begin by transforming a string of bits (a watermark) into a
`smooth, almost transparent pattern to be overlaid over the
`carrier image. The watermark bit-string consists of two
`parts—a hash of the image, and the author’s identification
`number(a signature). The digital watermark will thereby be
`image-specific, that is, tied to just the one image we wantto
`authenticate. The watermark must depend on the image hash
`in acomplicated mannerin orderto thwart the kind of attack
`discussed by S. Craver, N. Memon, Boo-Lock Yeo, and M.
`Yeung (“Can Invisible Watermarks Resolve Rightful
`Ownerships?”, IBM Research Report RC20509, Jul. 25,
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`1996). The watermark will also contain an important piece
`of information uniquely connected to the author of the
`image.
`We require a sensitive dependence between the water-
`mark and the resulting pattern. The pattern should not
`exhibit
`traces of any regular building blocks. Also,
`the
`respective patterns generated by each of two different water-
`marks should not be correlated.
`
`We seed a random numbergenerator with the watermark
`bit-string to create an initial black and white two-
`dimensional random pattern. The pattern is further pro-
`cessed to eliminate high frequencies, for example, by apply-
`ing low-passfilters to the initial pattern.
`In another embodiment, we use the initial pattern as an
`initial condition for a chaotic spatio-temporal dynamical
`system that has a tendency to create large-scale smooth
`structures.
`In still another embodiment, we use cellular
`automata with appropriate rules. For example, it is known
`that voting rules and their modifications can coalesce ran-
`dom patterns into large-scale structures (see T. Toffoli and N.
`Margolus, Cellular Automata Machines, MIT Press, 1987).
`FIG. 1A shows a randomly generated initial pattern. This
`initial pattern was initialized with 0’s and 1’s that had an
`equal 50% probability. The random black and white pattern
`was then processed by a cellular automaton with a voting
`rule. According to this mle the center element follows the
`majority of its neighbors.In particular, we count the number,
`P, of 1’s in the 3x3 neighborhoodof the center (including the
`center) and set the center to 0 if P<5; otherwise, we set the
`center to 1. The cellular automaton with a voting rule always
`stops after finitely many steps (for a 128x128 image, this
`number is always less than 40). The resulting pattern is
`shown together with three intermediate patterns in FIGS.
`1B-1E. As can be seen, the initially random pattern has
`coalesced into several connected areas that form an irregular
`pattern, which depends on the seed of the random number
`generator (and therefore on the watermark sequence) in a
`complicated way. As the last step, we applied a smoothing
`operation with a 7x7 kernel eight times. The color depth of
`the resulting image was decreased to 16.
`FIG. 2 shows examplesof five different patterns. Before
`we add these patterns to an image, we subtract 8 from the
`value of each pixel in the pattern so that the pixels of the
`original, unwatermarked image are modified by no more
`than +8 gray levels.
`Since the overlaid image has most of its power concen-
`trated in low frequencies, we expect excellent robustness
`properties similar to the method proposed by Cox et al.
`[Cox]. Since our overlaid pattern depends on the key in a
`complicated way, even if the watermark becomesvisible in
`regions of nearly constant luminosity, it does not reveal any
`information about
`the key if a cryptographically strong
`random numbergenerator is used. Another advantage ofthis
`technique is that it avoids transformations, which results in
`a faster and easier implementation.
`Referring to FIG. 3, the present invention for embedding
`digital watermark data can be divided into five steps: (1)
`Generating the watermark sequence=hash of the image
`+author’s signature+other information— (2) generating an
`initial two-dimensional black and white random pattern
`(3) coalescing the black and white regions using a cellular
`automaton— (4) smoothing the pattern— (5) rescaling and
`adding the pattern to the original image.
`Step No. 1 proceeds as follows. The watermark is a
`concatenation of two or morebit-strings. Thefirst bit-string
`will be the author’s ID; the second, a function of the image
`
`

`

`6,101,602
`
`7
`(an image digest can be obtained using classical crypto-
`graphic hash functions or message digest functions). These
`two bit-strings are necessary to make the watermark pattern
`depend on both the author’s ID and the image content.
`Additional optional
`information can be added to the
`watermark, such as the date and time of the origin of the
`image, serial number(for tracking purposes should a single
`copy be distributed to several users), etc. Both the author’s
`ID bit-string and the image digest should have more than 64
`bits to prevent a brute-force search for the key under a
`known-plain-text type of attack.
`
`In Step No. 2 the watermarkbit-string is converted into a
`seed for a cryptographically strong pseudo-random number
`generator. This conversion can take place by applying a
`cryptographically strong hash function to the watermark
`bit-string or by some other conversion that
`transforms
`bit-strings into numbersin the range required by the pseudo-
`random number generator. Again, to prevent a brute-force
`search for the author’s ID using a known-plaintext type of
`attack, the range of the seed should be more than 2°*. The
`pseudo-random numbergenerator generates an initial black
`and white pattern of the same dimensions as the original
`image to be watermarked. Since this pattern depends sen-
`sitively on the seed,
`it guarantees that
`the pattern also
`depends sensitively on each bit of the watermark bit-string.
`
`In Step No. 3 the initial pseudo-random black and white
`pattern is processed further to create a random collection of
`connected areas, thereby transforming the spectral energy of
`the pattern to lower frequencies. This task can be achieved
`by various means, such as using a spatio-temporal two-
`dimensional chaotic system. The method proposed in this
`embodiment uses a cellular automaton with voting rules.
`Such an automaton has the tendency to coalesce black and
`white pixels together, thus creating connected areas of black
`and white pixels. The automaton is described in detail in
`FIGS. 1B-1E above.
`
`In Step No. 4, to remove edges from the pattern obtained
`using the cellular automaton, the pattern is smoothed by an
`averaging operation such as the Laplacian filter. Any other
`kernel convolution in general will work. This process pro-
`duces a pattern that is smooth and random looking, with its
`energy concentrated in the low frequencies. The pattern also
`depends sensitively on the watermark bit-string.
`
`Finally, in Step No. 5 the amplitude of the smocthened
`pattern is rescaled to some fixed range so that, when the
`patternis laid over the original image, no visible artifacts are
`created. Based on our experiments, we recommend rescaling
`the smoothed pattern to gray levels between —8 and 8. The
`rescaled image is finally added to the original image to get
`a watermarked version of the original image.
`
`the watermark is retrieved by the
`Referring to FIG. 4,
`following steps. First, subtract the watermarked image from
`the original
`to obtain the difference. Then calculate the
`correlation between the difference thus obtained and the
`smoothedpattern. From the value of the correlation, decide
`whether or not the watermarkis present. In our experiments,
`the correlation in Fourier space gave better results than the
`correlation in the spatial domain.
`
`the
`Denoting the original unwatermarked image as X,
`watermarked image as X', the modified watermarked image
`as X*,
`the following function was used to decide the
`presence or absence of a watermark:
`
`DD
`sim(X*, X’) = ————_——_.,
`VD*-D* ¥D-D
`
`where D=Y'- Y, D*=Y*- Y, and the symbols Y, Y', and Y*
`denote the lowest 1024 discrete cosine coefficients that
`corresponding respectively to X, X', and X*.
`The watermarked image shows no visible degradation
`caused by the overlaid pattern, yet the pattern is robustly
`embedded. The watermark can be shownto be present even
`after a number of operations on images: filtering, JPEG
`compression with a quality factor as low as 5%, cropping,
`resampling, blurring, downsampling, and adding noise. The
`watermark also resists a collusion attack (averaging several
`watermarked images to remove the watermark). A math-
`ematical analysis of robustness is hard to perform because
`the relationship between the watermark sequence and the
`final watermark pattern is quite complex. Therefore the
`robustness of the method has been tested solely by computer
`simulation.
`images.
`A digital video is a sequence of digital still
`Therefore the present invention is readily extended to video.
`A digital video-stream can be watermarked in any of the
`following ways. First, one can watermark a selection of
`individual video-frames according to a pseudo-random
`sequence chosen by meansof a password. Second, one can
`simply watermark all the frames in a video-stream. Thefirst
`approach is faster, as only some of the frames are water-
`marked. Of course, this permits an infringer to copy an
`unwatermarked image and reuse it without detection of the
`infringement. However, as the infringer cannot know which
`frames are watermarked and which are not,
`the risk of
`undetected infringement is small. Thus, though the second
`approach offers better security, its heavier burden of com-
`putation may not be worthwhile.
`Clearly many modifications and variations of the present
`invention are possible in light of the above teachings. It
`should therefore be understood that, within the scope of the
`inventive concept, the invention may be practiced otherwise
`than as specifically claimed.
`Whatis claimed is:
`1. A method of marking, with an invisible identifier that
`cannot be removed therefrom, an electronic file containing
`a stream of samples comprising at least one image, which
`method comprises the steps of:
`selecting a first bit-string to represent authorship of said
`file;
`selecting a second bit-string to represent content of said
`file;
`combining said first and said second bit-string into said
`identifier;
`applying a function to convert said identifier into a
`number in a range effective for seeding a pseudo-
`random number generator;
`deriving a pseudo-random black and white pattern from
`said number by meansof said generator,
`said pattern having dimensions substantially the same
`as said file;
`processing said pattern to create a random collection of
`connected areas,
`thereby transforming said pattern’s
`spectral energy to lower frequencies;
`smoothing said pattern;
`rescaling said smoothed pattern so that its amplitude is
`more than one unit sample; and
`adding said rescaled, smoothed pattern to said file,
`whereby said file is marked with said identifier.
`
`10
`
`15
`
`20
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`

`

`6,101,602
`
`10
`
`15
`
`10
`9
`said pattern being rescaled to dimensionssubstantially the
`2. The method of claim 1, wherein said step of applying
`includes a hash function.
`same as said file and overlaid thereon;
`3. The method of claim 1, wherein said step of applying
`said pattern being generated from a combinationofafirst
`includes a message digest function.
`and a second bit-string;
`4. The method of claim 1, wherein said step of processing
`said first bit-string being selected to represent authorship
`includes applying a cellular automaton.
`of said file; and
`5. The method of claim 4, wherein said cellular automaton
`has voting rules.
`said second bit-string being selected to represent content
`6. The methodof claim 4, wherein said cellular automaton
`of said file.
`has annealing rules.
`7. The method of claim 1, wherein said step of processing
`includes using said pattern as an initial condition for a
`chaotic spatio-temporal dynamical system.
`8. The method of claim 7, wherein said dynamical system
`tends to create large-scale smooth structures.
`9. The method of claim 1, wherein said step of processing
`includes eliminating high frequencies from said pattern’s
`spectral energy.
`10. The method of claim 9, wherein said step of process-
`ing includes eliminating said high frequencies by applying at
`least one low-passfilter.
`11. The method of claim 1, wherein said step of combin-
`ing includes concatenating.
`12. The method of claim 1, wherein said step of combin-
`ing includesalternating bits from said first and said second
`bit-strings.
`13. The method of claim 1, wherein said step of combin-
`ing includes processing bits from said first and said second
`bit-strings prior to combining them.
`14. The method of claim 13, wherein said step of pro-
`cessing includes applying a hash functionto said first string
`and/or said secondstring.
`15. A method of determining whetheror not an electronic
`file containing at least one image also contains an invisible
`identifier, which method comprises the steps of:
`subtractin

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket