×

Method and apparatus for watermarking images

  • US 20030147547A1
  • Filed: 02/11/2003
  • Published: 08/07/2003
  • Est. Priority Date: 01/10/2001
  • Status: Active Grant
First Claim
Patent Images

1. An image-processing method, comprising:

  • comparing a first transformed-domain image datum to a second transformed-domain image datum, for deriving a first authentication code, the first transformed-domain image datum having a first transformed-domain location, and the second transformed-domain image datum having a second transformed-domain location; and

    using a replacement code to replace at least a portion of a third transformed-domain image datum, for converting the third transformed-domain image datum into a fourth transformed-domain image datum, the replacement code comprising at least one of the first authentication code, a code derived from the first authentication code, a code selected based upon at least the first authentication code, and a code selected based upon at least the code derived from the first authentication code, the fourth transformed-domain image datum having a third transformed-domain location, the first transformed-domain image datum being for deriving a fifth transformed-domain image datum having a fourth transformed-domain location, the second transformed-domain image datum being for deriving a sixth transformed-domain image datum having a fifth transformed-domain location, the fourth transformed-domain image datum being for deriving a seventh transformed-domain image datum having a sixth transformed-domain location, the fourth transformed-domain location being approximately equal to the first transformed-domain location, the fifth transformed-domain location being approximately equal to the second transformed-domain location, and the sixth transformed-domain location being approximately equal to the third transformed-domain location, wherein the fifth, sixth, and seventh transformed-domain image data are for being authenticated by an authentication procedure comprising the steps of;

    using an authentication code extraction function to extract a second authentication code from the seventh transformed-domain image datum, comparing the fifth transformed-domain image datum to the sixth transformed-domain image datum, for deriving a first comparison result, based on the second authentication code, selecting a set of at least one acceptable value of the first comparison result, and if the first comparison result is not within the set of at least one acceptable value of the first comparison result, determining that at least one of the fifth, sixth, and seventh transformed-domain image data has been improperly altered.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×