throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`_____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_____________
`
`SONY GROUP CORPORATION (JAPAN), SONY CORPORATION OF
`AMERICA, SONY INTERACTIVE ENTERTAINMENT LLC, SONY
`PICTURES ENTERTAINMENT INC., SONY ELECTRONICS INC., and
`VERANCE CORPORATION,
`Petitioners,
`
`v.
`
`MZ AUDIO SCIENCE, LLC,
`Patent Owner.
`_____________
`
`Case No. TBD
`Patent No. 7,289,961
`_____________
`
`DECLARATION OF RACHEL J. WATTERS
`RELATING TO EXHIBIT 1021(cid:3)
`
`Sony Exhibit 1053
`Sony v. MZ Audio
`
`

`

`Declaration of Rachel J. Watters on Authentication of Publication
`
`I, Rachel J. Watters, am a librarian, and the Head of Resource Sharing for the
`
`General Library System, Memorial Library, located at 728 State Street, Madison,
`
`Wisconsin, 53706. Part of my job responsibilities include oversight of Wisconsin
`
`TechSearch (“WTS”), an interlibrary loan departmentat the University of Wisconsin-
`
`Madison.
`
`I have worked asa librarian at the University of Wisconsin library system
`
`since 1998, starting as a graduate student employee in the Kurt F. Wendt Engineering
`
`Library and WTS,thenasa librarian in Interlibrary Loan at Memorial Library.
`
`I began
`
`professional employment at WTSin 2002 and became WT's Director in 2011. In 2019,
`I became of Head of Resource Sharing for UW-Madison’s General Library System.
`|
`
`have a master’s degree in Library and Information Studies from the University of
`
`Wisconsin-Madison. Through the course of my studies and employment, I have
`
`become well informed about the operations of the University of Wisconsin library
`
`system, which followsstandard library practices.
`
`This Declaration relates to the dates of receipt and availability of the following:
`
`Wu,C.-P., Su, P.-C., and Kuo, C.-C.J. (2000). Robust and
`efficient digital audio watermarking using audio content
`analysis. In Wong, P.W. and Delp, E.J. (Eds.) Security and
`Watermarking ofMultimedia Contents I, 24-26 January 2000,
`San Jose, California, p. 382-392.
`
`Standard operating procedures for materials at the University of Wisconsin-
`
`Madison Libraries. When a volumewasreceived by the Library, it would be checked
`
`

`

`Declaration of Rachel J. Watters on Authentication of Publication
`
`in, addedto library holdings records, and madeavailable to readers as soon afterits
`
`arrival as possible. The procedure normally took a few daysor at most 2 to 3 weeks.
`
`Exhibit A to this Declaration is true and accurate copy of the front matter of the
`
`Security and Watermarking ofMultimedia Contents II, 24-26 January 2000, San Jose,
`
`California (2000) publication, which includes a stamp on the verso page showing that
`this bookis the property of the Wendt Library at the University of Wisconsin-Madison.
`
`Exhibit A also includes an excerpt of pages 382 to 392 of that volume, showing the
`
`article entitled Robust andefficient digital audio watermarking using audio content
`
`analysis (2000).
`Attached as Exhibit B is the cataloging system record ofthe University of
`Wisconsin-Madison Libraries for its copy of the Security and Watermarking of
`
`Multimedia Contents II, 24-26 January 2000, San Jose, California (2000)publication.
`
`As showninthe “Receiving date”field of this Exhibit, the University of Wisconsin-
`
`Madison Libraries ownedthis book and hadit cataloged in the system as of June 14,
`
`2000.
`
`Membersof the interested public could locate the Security and Watermarking of
`
`Multimedia Contents II, 24-26 January 2000, San Jose, California (2000) publication
`
`after it was cataloged by searchingthe public library catalog or requesting a search
`
`through WTS. The search could be done bytitle, editor, and/or subject key words.
`
`

`

`Declaration of Rachel J. Watters on Authentication of Publication
`
`Membersofthe interested public could access the publication by locating it on the
`
`library’s shelves or requesting it from WTS.
`
`I declare that all statements made herein of my own knowledgearetrue and that
`
`all statements made on information and belief are believed to be true; and further that
`
`these statements were made with the knowledgethat willful false statements andthe like
`
`so madeare punishable by fine or imprisonment, or both, under Section 1001 ofTitle 18
`
`of the United States Code.
`
`Date: September2, 2022
`
`Memorial Library
`728 State Street
`Madison, Wisconsin 53706
`
`H¢ad of Resource Sharing
`
`

`

`
`
`
`
`
`
`EXHIBIT A
`EXHIBIT A
`
`

`

`Security and Watermarking
`of Multimedia Contents II
`
`Volume 3971
`
`Ping Wah Wong
`Edward J. Delp
`Chairs/Editors
`
`24-26 January 2000
`San Jose, California
`
`Sponsored by
`IS&T-The Society for Imaging Science and Technology
`SPIE-The International Society for Optical Engineering
`
`PROCEEDINGS OF SPIE
`
`SPIE—The International Society for Optical Engineering
`
`a
`
`

`

`YDAL—4n
`
`2><OYwo
`
`omve
`
`aA-
`
`ND
`
`SS
`
`rice
`
`coLn
`
`

`

`
`
`PROCEEDINGS OF SPIE
`
`SPIE—TheInternational Society for Optical Engineering
`
`Security and Watermarking
`of Multimedia Contents II
`
`Ping Wah Wong
`Edward J. Delp
`Chairs/Editors
`
`24-26 January 2000
`San Jose, California
`
`Sponsored by
`IS&T-The Society for Imaging Science and Technology
`SPIE-The International Society for Optical Engineering
`
`
`
`Volume 3971
`
`
`
`
`
`
`
`I]$}U9}U0DeIpawHjnwjoBuPjzewsazeMpueAyINdag
`
`
`
`|
`
`3
`S
`|
`y
`=.
`oown
`’
`@
`
`=———
`
`——
`
`——
`——
`
`— —
`
`===
`eS——
`=—S
`———
`—=
`
`|
`|
`
`I
`
`onal?
`
`=S
`at
`e
`So
`
`e—
`
`enero
`eea
`
`ISSN 0277-786x
`ISBN 0-8194-3589-9
`
`—
`
`

`

`PROCEEDINGS OF SPIE
`\@ia). SPIE—The International Society for Optical Engineering
`
`Security and Watermarking
`of Multimedia Contents II
`
`Ping Wah Wong
`Edward J. Delp
`Chairs/Editors
`
`24-26 January 2000
`San Jose, California
`
`Sponsored by
`IS&T—The Society for Imaging Science and Technology
`SPIE—The International Society for Optical Engineering
`
`Published by
`SPlE—The International Society for Optical Engineering
`
`
`
`
`
`Volume 3971
`
`SPIE is an international technical society dedicated to advancing engineering and scientific
`applications of optical , photonic, imaging, electronic, and optoelectronic technologies.
`
`
`
`

`

`Libraty
`con
`ANomposed
`of NP all Mg1688
`
`;
`
`
`
`The papers appearing in this book compose the proceedingsof the technical conference cited on
`the coverandtitle page of this volume. They reflect the authors' opinions and are published as
`presented, in the interests of timely dissemination. Their inclusion in this publication does not
`necessarily constitute endorsement by the editors or by SPIE. Papers were selected by the
`conference program committee to be presented in oral or poster format, and were subject to
`review by volumeeditors or program committees.
`
`Please use the following format to cite material from this book:
`
`Author(s), "Title of paper," in Security and Watermarking of Multimedia Contents II, Ping Wah
`Wong, EdwardJ. Delp, Editors, Proceedings of SPIE Vol. 3971, page numbers (2000).
`
`ISSN 0277-786X
`ISBN 0-8194-3589-9
`
`Published by
`SP1E—TheInternational Society for Optical Engineering
`P.O. Box 10, Bellingham, Washington 98227-0010 USA
`Telephone 360/676-3290 (Pacific Time) ¢ Fax 360/647-1445
`
`Copyright ©2000, The Society of Photo-Optical Instrumentation Engineers.
`
`Copying of material in this book for internal or personaluse,orfor the internal or personal use
`of specific clients, beyondthefair use provisions granted by the U.S. Copyright Law is authorized
`by SPIE subject to paymentof copyingfees. The Transactional Reporting Service base fee for this
`volumeis $15.00 perarticle (or portion thereof), which should bepaid directly to the Copyright
`Clearance Center (CCC), 222 Rosewood Drive, Danvers, MA 01923. Payment mayalso be made
`electronically through CCC Online at http:/(www.directory.nel/copyright/. Other copying for
`republication,resale, advertising or promotion, or any form ofsystematic or multiple reproduction
`of any material in this book is prohibited except with permission in writing from the publisher.
`The CCCfee code is 0277-786X/00/$15.00.
`
`Printed in the United States of America.
`
`
`
`

`

`
`
`Contents
`
`Conference Committee
`Introduction
`
`xi
`
`SESSION 1
`COMMUNICATIONS APPROACH TO WATERMARKING
`Improving the robustness of nonadditive watermarks through optimum detection theory
`2
`[3971-01]
`A. Piva, Univ. degli Studi di Firenze (Italy); M. Barni, Univ. degli Studi di Siena (Italy);
`F. Bartolini, V. Cappellini, A. De Rosa, Univ. degli Studi di Firenze (Italy)
`
`14
`
`24
`
`48
`
`60
`
`Detection theory and digital watermarking [3971-02]
`A. Robert, R. Knopp, Swiss Federal Institute of Technology/Lausanne
`
`Improving data hiding by using convolutional codes and soft-decision decoding [3971-03]
`J. R. Hernandez, J.-F. Delaigle, B. M. M. Macq, Univ. Catholique de Louvain (Belgium)
`
`Preprocessed and postprocessed quantization index modulation methodsfor digital
`watermarking [3971-04]
`B. Chen, G. W. Wornell, Massachusetts Institute of Technology
`
`Quantization watermarking [3971-05]
`J. J. Eggers, Univ. of Erlangen-Nuremberg (Germany); B. Girod, Stanford Univ.
`
`IMAGE WATERMARKING |
`SESSION 2
`74
`Automatic recovery ofinvisible image watermarks from geometrically distorted images
`[3971-06]
`G. W. Braudaway, F. C. Mintzer, IBM ThomasJ. Watson Research Ctr.
`
`82
`
`90
`
`99
`
`Geometric distortion correction in image watermarking [3971-07]
`M. Alghoniemy, A. H. Tewfik, Univ. of Minnesota/Twin Cities
`
`Rotation-, scale-, and translation-resilient public watermarking for images [3971-08]
`C.-Y. Lin, Columbia Univ.; M. Wu, Princeton Univ.; J. A. Bloom,I. J. Cox, M. L. Miller, NEC
`Research Institute; Y. M. Lui, Signafy, Inc.
`
`Robust watermarking based on the warping of predefined triangular patterns [3971-09]
`P. Bas, J.-M. Chassery, Lab. des Images et des Signaux (France), B. M. M. Macq, Univ.
`Catholique de Louvain (Belgium)
`
`110
`
`Smearing-desmearing transformation and the application to digital watermark [3971-10]
`T. Okahisa, K. Ohue, Ehime Univ. (Japan)
`
`

`

`SESSION 3
`AUTHENTICATION WATERMARK I
`120
`Spatial watermark for imageverification [3971-11]
`M. P. Queluz, P. Lamy, Instituto Superior Técnico (Portugal)
`
`131
`
`140
`
`152
`
`164
`
`Compression-compatible fragile and semifragile tamper detection [3971-12]
`L. M. Marvel, G. W. Hartwig, Jr., Army Research Lab.; C. G. Boncelet,Jr., Univ. of Delaware
`
`Semifragile watermarking for authenticating JPEG visual content [3971-13]
`C.-Y. Lin, S.-F. Chang, Columbia Univ.
`
`Detection of imagealterations using semifragile watermarks [3971-14]
`E. T. Lin, Purdue Univ; C.
`|. Podilchuk, Lucent Technologies/Bell Labs.; E. J. Delp,
`Purdue Univ.
`
`Distortion-bounded authentication techniques [3971-15]
`N. D. Memon, Polytechnic Univ.; P. L. Vora, Hewlett-Packard Labs.; B.-L. Yeo, EXP.com;
`M. M. Yeung, Intel Corp.
`
`VIDEO WATERMARKING I
`SESSION 4
`
`Newapproachfor transformation-invariant image and video watermarking in the spatial
`176
`domain:self-spanning patterns (SSP) [3971-16]
`J. Dittmann, T. Fiebig, R. Steinmetz, German National Research Ctr. for Information
`Technology
`
`186
`
`198
`
`209
`
`Robust frame-dependent video watermarking [3971-18]
`M. J. Holliman, W. Macy, M. M. Yeung,Intel Corp.
`
`Real-time detection of video watermark on Intel architecture [3971-19]
`Y.-K. Chen, M. J. Holliman, W. Macy, M. M. Yeung, Intel Corp.
`
`Adaptive video watermarking using motion information [3971-20]
`C.-H. Lee, Korea AdvancedInstitute of Science and Technology; H.-S. Oh, Electronics
`and Telecommunications Research Institute (Korea); H.-K. Lee, Korea AdvancedInstitute
`of Science and Technology
`
`DATA HIDING
`SESSION 5
`
`218
`
`228
`
`237
`
`Embeddingdigital watermarks in halftone screens [3971-21]
`S.-G. Wang, K. T. Knox, Xerox Corp.
`
`Data hiding for halftone images [3971-22]
`M. S. Fu, O. C. Au, Hong Kong Univ. of Science and Technology
`
`Data hiding and watermarking in JPEG-compressed domain by DC coefficient modification
`[3971-23]
`P. H. W. Wong,O. C. Au, J. W. C. Wong, Hong Kong Univ. of Science and Technology
`
`

`

`
`
` SESSION 6 IMAGE SECURITY SYSTEMS
`
`
`
`246
`
`264
`
`274
`
`Overview of multimedia content protection in consumerelectronics devices [3971-24]
`A. M. Eskicioglu, Thomson Consumer Electronics; E. J. Delp, Purdue Univ.
`
`Smart Images using Digimarc's watermarking technology [3971-25]
`A. M. Alattar, Digimarc Corp.
`
`Hardware/software implementation 3-way algorithm for image encryption [3971-26]
`P. P. Dang, P. M. Chau, Univ. of California/San Diego
`
`
`SESSION 7
`IMAGE WATERMARKING II
`
`286
`
`295
`
`306
`
`314
`
`326
`
`Visual hash for oblivious watermarking [3971-27]
`J. Fridrich, SUNY/Binghamton and Mission Research Corp.
`
`Spatial-frequency composite watermarking for digital image copyright protection [3971-28]
`P.-C. Su, C.-C. J. Kuo, Univ. of Southern California and Media Fair, Inc.
`
`Secure digital watermark generation based on chaotic Kolmogorovflows [3971-29]
`J. Scharinger, Johannes-Kepler-Univ. Linz (Austria)
`
`Fundamental performancelimits of power-spectrum condition-compliant watermarks
`[3971-30]
`J. K. Su, Univ. of Erlangen-Nuremberg (Germany); B. Girod, Stanford Univ.
`
`Robust watermarking using robust coefficients [3971-31]
`T. Liang, J. J. Rodriguez, Univ. of Arizona
`
`
`SESSION 8
`ATTACK
`
`338
`
`346
`
`358
`
`371
`
`Possible counter-attacks against random geometric distortions [3971-32]
`J.-L. Dugelay, Institut Eurécom (France); F. A. P. Petitcolas, Microsoft Research Ltd. (UK)
`
`Countermeasures for unintentional and intentional video watermarking attacks [3971-33]
`F. Deguillaume, G. Csurka, T. Pun, Univ. of Geneva (Switzerland)
`
`Generalized watermarking attack based on watermark estimation and perceptual
`remodulation [3971-34]
`S. Voloshynovskiy, Univ. of Geneva (Switzerland) and Digital Copyright Technologies
`(Switzerland); S. Pereira, Univ. of Geneva (Switzerland); A. Herrigel, N. Baumgartner, Digital
`Copyright Technologies (Switzerland); T. Pun, Univ. of Geneva (Switzerland)
`
`Watermark copyattack [3971-35]
`M. Kutter, Digital Copyright Technologies (Switzerland); $. Voloshynovskiy, Digital Copyright
`Technologies (Switzerland) and Univ. of Geneva (Switzerland); A. Herrigel, Digital Copyright
`Technologies (Switzerland)
`
`SESSION 9
`AUDIO WATERMARKING
`
`
`382
`
`Robust and efficient digital audio watermarking using audio content analysis [3971-36]
`C.-P. Wu, P.-C. Su, C.-C. J. Kuo, Media Fair, Inc. and Univ. of Southern California
`
`
`
`
`
`

`

`393
`
`Audio registration and its application in digital watermarking [3971-37]
`C. Xu, J. Wu, Q. Sun, Kent Ridge Digital Labs. (
`Singapore)
`
`
`SESSION 10
`AUTHENTICATION WATERMARK II
`
`
`
`404
`
`417
`
`428
`
`438
`
`VQ-based digital signature scheme for multimedia content authentication [3971-39]
`Q. Sun, Kent Ridge Digital Labs. (Singapore); D. Zhong, S.-F. Chang, Columbia Univ.; J. Wu,
`A. D. Narasimhalu, Kent Ridge Digital Labs. (Singapore)
`
`Secret and public key authentication watermarking schemesthat resist vector quantization
`attack [3971-40]
`P. W. Wong, Hewlett-Packard Co.; N. D. Memon, Polytechnic Univ.
`
`Further attacks on Yeung-Mintzerfragile watermarking scheme [3971-41]
`J. Fridrich, M. Goljan, SUNY/Binghamton; N. D. Memon, Polytechnic Univ.
`
`Secure digital photograph handling with watermarking technique in insurance claim process
`[3971-42]
`K. Toyokawa, Nihon Univ. (Japan); N. Morimoto, S. Tonegawa, K. Kamijo, A. Koide, IBM
`Japan Ltd.
`
`
`SESSION 11
`VIDEO WATERMARKING II
`
`448
`
`455
`
`465
`
`477
`
`486
`
`Hiding video in plain sight [3971-43]
`C. P. Rosiene, Univ. of Hartford; J. A. Rosiene, Analysis and Technology
`
`Combinedvideo and audio watermarking: embedding content information in multimedia data
`[3971-44]
`J. Dittmann, M. Steinebach, German National Research Ctr. for Information Technology;
`|. Rimac, S. Fischer, Darmstadt Univ. of Technology (Germany); R. Steinmetz, German National
`Research Ctr. for Information Technology and Darmstadt Univ. of Technology (Germany)
`
`Object watermarking for for MPEG-4 video streams copyright protection [3971-45]
`M. Barni, Univ. degli Studi di Siena (Italy); F. Bartolini, V. Cappellini, N. Checcacci, Univ.
`degli Studi di Firenze (Italy)
`
`Robust compressed video watermarking [3971-46]
`J. Jing, Y. Guan, Nanyang Technological Univ. (Singapore)
`
`Quality evaluation of watermarked video [3971-47]
`W. Macy, M. J. Holliman, Intel Corp.
`
`
`
`SESSION 12
`IMAGE WATERMARKING II]
`
`Topological-ordered color table for BPCS-steganography using indexed color images
`[3971-48]
`R. Ouellette, H. Noda, M. Niimi, E. Kawaguchi, Kyushu Institute of Technology (Japan)
`
`Color opponency watermarking schemefor digital images [3971-49]
`S. Battiato, D. Catalano, G. Gallo, Univ. of Catania (Italy); R. Gennaro, IBM ThomasJ. Watson
`Research Ctr.
`
`502
`
`510
`
`vi
`
`

`

`Watermark optimization technique based on genetic algorithms [3971-50]
`C.-H. Huang,J.-L. Wu, National Taiwan Univ.
`
`Blind watermarking system for digital images in the wavelet domain [3971-51]
`A. Lumini, D. Maio, Univ. degli Studi di Bologna (Italy)
`
`Digital image watermarking on a special object: the human face [3971-52]
`H.-S. Oh, D.-H. Chang, Electronics and Telecommunications ResearchInstitute (Korea);
`C.-H. Lee, H.-K. Lee, Korea AdvancedInstitute of Science and Technology
`
`516
`
`524
`
`536
`
`545
`547
`
`Addendum
`
`Author Index
`
`

`

`Robust and Efficient Digital Audio Watermarking Using Audio
`Content Analysis
`
`Chung-Ping Wu, Po-Chyi Su and C.-C. Jay Kuo
`Media Fair, Inc., 1055 Corporate Center Dr., Ste 580
`Monterey Park, CA 91754
`and
`Department of Electrical Engineering-Systems
`University of Southern California, Los Angeles, CA 90089-2564
`E-mail:{chungpin,pochyisu,cckuo}@sipi.usc.edu
`
`ABSTRACT
`Digital audio watermarking embeds inaudible information into digital audio data for the purposes of copyright
`protection, ownership verification, covert communication, and/or auxiliary data carrying.
`In this paper, we first
`describe the desirable characteristics of digital audio watermarks. Previous work on audio watermarking, which
`has primarily focused on the inaudibility of the embedded watermark andits robustness against attacks such as
`compression and noise,
`is then reviewed.
`In this research, special attention is paid to the synchronization attack
`caused by casualaudio editing or malicious random cropping, which is a low-cost yet effective attack to watermarking
`algorithms developed before. A digital audio watermarking scheme of low complexity is proposed in this research as
`an effective way to deter users from misusingorillegally distributing audio data. The proposed schemeis based on
`audio content analysis using the wavelet filterbank while the watermark is embedd in the Fourier transform domain.
`A blind watermark detection technique is developed to identify the embedded watermark under various types of
`attacks.
`Keywords: digital watermark, blind watermark detection, audio content analysis, synchronization attack, human
`auditory system, malicious cropping attack,wavelet
`
`1. INTRODUCTION
`Digital audio watermarking, the embedding and detection of an imperceptible signalin digital audio data, has received
`increasing attention recently. Among various different uses of digital audio watermarking, copyright protection is
`the most highly demanded application. The fast growth of the Internet and the maturity of audio compression
`techniques enable the promising market of on-line music distribution. However, since the digital technology allows
`lossless data duplication,illegal copying and distribution would be mucheasier than before. This concern does make
`musical creators and distributors hesitant to step into this market quickly. Therefore, the proper content protection
`technology is the key to the emergence of this new market.
`Encryption and watermarking are the two most important content protection techniques. Encryption protects
`the content from anyone without the proper decryption key.
`It is useful in protecting the audio data from being
`intercepted during transmission. However, after the intended receiver decrypts it with the correct key, audio data
`could be illegally distributed and misused. Watermarks, on the other hand, cannot be removed from audio data
`even by the intended receiver. The embedded watermark signal permanently remainsin audio data after repeated
`reproduction andredistribution. Thus,this signal could be used to protect the copyright of audio content by playback
`prohibition, illegal copy source tracing and ownership establishment.
`Other applications of digital audio watermarking include data hiding for covert communication, auxiliary data
`embedding for audio content labeling, and modification detection for authentication. Data hiding can also be used
`to complement encryption, ie. enhancing communication security by concealing the existence of sensitive data
`transmission. Embeddedauxiliary data can carry lyrics or descriptions of the carrying audio data, or serve as links
`to external databases. Disappearance of fragile watermark could indicate unauthorized modifications and be used
`for content integrity verification.
`Different watermarking applications have different sets of requirements. Here, our discussion is focused on copy-
`right protection because it has the most stringent requirement on the watermark’s ability to survive intentional
`
`382
`
`In Security and Watermarking of Multimedia Contents Il, Ping Wah Wong, Edward J. Delp,
`Editors, Proceedings of SPIE Vol. 3971 (2000) ¢ 0277-786X/00/$15.00
`
`
`
`

`

`attacks. This is considered as one of the most challenging issues of the watermarking technology today. Users benefit
`from embedded label data while hackers do not know the existence of hidden communication data. Thus, embedded
`watermarks in these two applications are generally not subject to malicious attacks.
`This paperis organized as follows. The requirements for audio watermarking systems are described in Section
`2. Previous work on audio watermarking is reviewed in Section 3. Our current work onsalient point extraction and
`Fourier domain watermarkingis presented in Section 4. Experimental results and their analysis are given in Section
`5. Finally, concluding remarks are provided in Section 6.
`
`2. REQUIREMENTS FOR AUDIO WATERMARKING SYSTEMS
`In order for the embedded watermark to effectively protect the copyright of the digital audio data, it has been
`generally agreed!® that a good watermarking scheme should satisfy the following properties:
`
`1. The embedded watermark should not produce audible distortion to the sound quality of the original audio.
`2. The computation required by watermark embedding and detection should be low. The complexity of watermark
`detection should be especially low tofacilitate its integration into consumer electronic products.
`3. Watermark detection should be done without referencing the original audio data. This propertyis known as
`blind detection.
`
`4. The watermark should be undetectable without prior knowledge of the embedded watermark sequence. This
`property prevents attackers from reversing the embedding process to remove the watermark.
`5. The embedded watermark should be robust against commonsignal processing attacks suchas filtering, resam-
`pling and compression.
`6. The watermark should survive malicious attacks such as random cropping and noise adding. However, severe
`attacks that produce annoying noise can be ignored for the survival test.
`
`3. PREVIOUS WORK ON AUDIO WATERMARKING
`A variety of audio watermarking methods with very different characteristics have been proposed. They will be
`reviewed in this section.
`Early work on audio watermark embedding achieved inaudibility by placing watermark signals in perceptually
`insignificant regions. One popular choice was the higher frequency region,!°!? where human sensitivity declines
`compared to its peak around 1 kHz. In somesystems,'®" the watermark signalis high-pass filtered before being
`inserted into the original audio. In another system,!? the Fourier transform magnitudecoefficients over the frequency
`range from 2.4 kHz to 6.4 kHz are replaced with the watermark sequence. In these systems, inaudibility is further
`enhanced by only embedding watermarks in audio segments whose low frequency components have a higher energy
`value. The strong low frequency signals in the original audio could help to mask the embedded high frequency
`watermark signal.
`Another human ‘insensitive domain is the Fourier transform phase coefficients. Human ears are relatively insen-
`sitive to phase distortions, and especially lack the ability to perceive the absolute phase value. A scheme’ proposed
`to substitute the phase of an initial audio segment with a reference phase that represents the watermark. The phase
`of subsequent segmentsis adjusted to preserve the relative phase between segments. In another system,!? selected
`Fourier transform phasecoefficients in higher frequencies are discarded and new values are assigned based on neigh-
`boring reference coefficients. The watermark is represented by the relative phase betweenselected coefficients and
`their neighbors. The problem with watermarking schemes that hide watermark signals in perceptually insignificant
`regions is that they are less robust to signal processing and malicious attacks. Compression algorithmsdo not preserve
`these regions well so that malicious hackers could implement stronger attacks in these regions without introducing
`annoying noise.
`Anotherclass of algorithms embed watermarks as echosignals of the original audio. The inaudibility of echo
`hiding is based on the theory that-resonance is so common in our environment that human usually do not perceive
`it as noise. In these algorithms,”'# watermarksignals are actually delayed and attenuated versions of the original
`
`383
`
`

`

`signal. The watermark sequence is represented by delay amounts which are retrieved by observing autocorrelation
`peaks in the time domain’! or in the cepstrum domain.”
`~
`Recently, some researchers use a concept borrowed from spread spectrum communication and embed the water-
`mark as pseudo-random noise in the time domain. It is guaranteed by spread spectrum theory that the embedded
`watermark is statistically undetectable by hackers. Since human ears have different sensitivity to additive noise in
`different frequency bands, all proposed work uses somefilter to spectrally shape the pseudo-random (white) noise
`and achieve inaudibility. A simple band-pass filter was used in one work,!
`and a nonlinear filter was adopted in
`another.* In yet another system,!° instead of filtering white noise, a scheme was developed to generate the band-
`limited pseudo-random watermark signal. The inaudibility of the embedded watermark could be further ensured by
`utilizing the masking effects of the human auditory system. One system!®° used MPEG-I Audio Psychoacoustic
`Model 1 to spectrally shape the watermark signal while another system!’ used the masking model from MPEG-II
`AAC. Watermark detection is done by calculating the correlation between the watermarked audio signal and the wa-
`termark signal. Armed with the spread spectrum communication theory, this type of watermarking usually survives
`pretty well under distortions and attacks. However, synchronization is difficult to implement, and its computational
`cost is high.
`
`Another trend in digital audio watermarking is to combine watermark embedding with the compression or mod-
`ulation process. The integration could minimize unfavorable mutual interference between watermarking and com-
`pression, especially preventing the watermark from being removed by compression.
`In one scheme,'® ‘watermark
`embedding is performed during vector quantization. The watermark is embedded by changing the selected code
`vector or changing the distortion weighting factor used in the searching process. The need of the original audio to
`extract the watermark greatly limits the applications of this scheme. Another algorithm’? embeds watermark directly
`in the sigma delta modulation bitstream to eliminate the need of transforming it into PCM data, thereby keeping
`the computational cost low. This is important to the sigma delta modulation system, where hardware savings is
`the main goal. In another scheme,®?° watermarking is integrated with MPEG-II AAC compression. Watermarkis
`embedded by modifying selected compression coefficients such as the scale factor.
`
`4. PROPOSED ALGORITHM
`
`Although the methods describedin section 3 have their own features and properties, they share one common problem.
`That is, they are vulnerable to the synchronization attack in watermark detection. This problem could be resulted
`from casual audio editing such as cropping unwanted audio segments or intentional attacks such as randomly deleting
`or adding samples to watermarked audio data. This random sample cropping attack is very effective in interfering
`with the watermark detection process with respect to the algorithms mentioned above. This attack has a very low
`computational complexity. Besides, when donecorrectly, it would not introduce annoying noise to the underlying
`audio signals. One might argue that such a skillful attack could only be done by a few professionals and not by
`the majority of consumers. However, once a watermarking method is widely in use, it is almost certain that some
`professionals would produce and distribute attacking apparatuses so that a majority of common users would beable
`to perform the skillful attack. One method® was proposedto solve the synchronization problem, where an exhaustive
`search algorithm was used and the original audio signal was required. Consequently, its computational complexity
`is too high, and the needof original audio for watermark detection greatly limits its applications. Furthermore, it
`can only handle the casual editing attack, but not the random sample cropping attack.
`In this research, we propose a low complexity solution to the synchronization problem caused by both casual
`and malicious attacks. The solution is composed of a salient point extraction technique and a Fourier transform
`domain watermark embedding procedure. Salient point extraction through audio content analysis is done during
`both watermark embedding and detection processes so that synchronization is regained at each salient point. The
`extraction algorithm is designed such that salient points remain stable after distortion. TheFourier transform domain
`watermark embedding and detection is adopted since the frequency domain information is less effected by sample
`cropping in the time domain.
`
`One commoncharacteristic among most existing audio watermarking algorithms is that their watermark is em-
`bedded throughout the entire audio signal. However, this may not be the most efficient way to embed and detect
`watermarks. For a skilled attacker, different amount of attack could be applied to different segments of the audio
`signal to avoid introducing annoying noise. For example, randomly cropping (deleting) one sample out of every 100
`samples in high energy tonal segments of audio signals would produce noticeable noise, but the effect of doing so in
`
`384
`
`

`

`fnpnchnnfn—}—}ff]tg ttt}Ytotir
`erttha eney
`jtoo eertt
`rs)eatt
`TT eee) Uo td i
`eenoe
`7
`oat
`Leactileceal
`eT
`ptt|
`Sr
`iiHii
`Pee
`2 Aeeoto +}
`._
`Lah
`ry ——+
`
`
`
`neue finontaedietlimedlthdAtTt ——|celtealbeseedaneedhape co a asmsSoesenen
`
`ee
`tt rtee
`RS 4Creer
`eeOe
`i
`|
`c
`SEIGJA BAC,
`’
`1
`
`ele
`
`{
`
`PGE
`
`{GJAsB,|
`
`CIDJE,IF,IG4 ALB,
`
`Figure 1. Illustration of the correspondence between music notes and frequency values, and the 5-subbandpartition
`adopted in this work
`
`low energy segments would be inaudible. Thus, watermarks embedded in highly-attackable areas will face heavier
`attack and are morelikely to be destroyed. The second major contribution of this work is the introduction of “attack-
`sensitive regions” via audio content analysis. If the watermark is only embedded in attack-sensitive regions where
`little attack could be applied, the computational complexity of both watermark embedding and detection could be
`reduced.
`
`By combining techniquesof salient point extraction, attack-sensitive region identification, and Fourier transform
`domain watermark embedding and detection, we propose a complete audio watermark embedding and detection
`system for copyright protection. This system satisfies all desired properties of watermark design described earlier.
`Furthermore, it has a very low computational complexity, and it is robust to casual and intentional synchronization
`attacks. Although we incorporate the concept ofsalient point extraction and attack-sensitive regions into our own
`watermark embedding methodhere, it is our belief that other watermark embedding algorithms will benefit from
`the same concepts as well.
`
`4.1. Audio Content Analysis for Watermarking
`In our system, audio content analysis is performed for the purposes of salient point extraction and attack-sensitive
`region identification. Salient points in an audiosignal allow watermark detection to resynchronize at these locations.
`Synchronization by salient points has far less complexity than exhaustive search and makes blind watermark detection
`possible

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket