Derivation and quantization of robust non-local characteristics for blind watermarking
First Claim
Patent Images
1. A computer implemented method for facilitating the protection of digital signals, the method comprising:
- obtaining a digital signal;
partitioning the signal into a plurality of segments using a secret key; and
using quantization index modulation (QIM), detecting whether the signal includes a watermark, wherein such QIM is based upon non-local characteristics of the plurality of segments.
1 Assignment
0 Petitions
Accused Products
Abstract
An implementation of a technology is described herein for deriving robust non-local characteristics and quantizing such characteristics for blind watermarking of a digital good.
-
Citations
18 Claims
-
1. A computer implemented method for facilitating the protection of digital signals, the method comprising:
-
obtaining a digital signal;
partitioning the signal into a plurality of segments using a secret key; and
using quantization index modulation (QIM), detecting whether the signal includes a watermark, wherein such QIM is based upon non-local characteristics of the plurality of segments. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. One or more computer-readable media having computer-executable instructions that, when executed by a computer, perform the acts comprising:
-
obtaining a digital signal;
partitioning the signal into a plurality of segments; and
quantizing statistics associated with each said segment to detect whether the signal contains a watermark, wherein the statistics associated with at least one said segment are determined from the non-local characteristics of a least two said segments. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A system for facilitating the protection of digital signals comprising:
-
a content provider configured to;
partition a signal into a plurality of segments using a secret key;
watermark the signal by performing quantization on statistics for each said segment; and
a client configured to detect whether a received signal includes the watermark utilizing the secret key. - View Dependent Claims (15, 16, 17, 18)
-
Specification