Watermarking in an encrypted domain
First Claim
1. A method for embedding auxiliary information symbols in an encrypted host content signal, comprising:
- encrypting a first version of a host content signal embedded with a first logical value to produce a first encrypted signal;
encrypting a second version of the host content signal embedded with a second logical value to produce a second encrypted signal; and
combining a first set of segments from said first encrypted signal with a second set of segments from said second encrypted signal in a pre-defined manner to produce a composite encrypted host content with embedded auxiliary information.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, apparatus and systems for embedding auxiliary information in encrypted host signals are provided. The present invention enables secure application of digital watermarks at any point in the transmission and/or distribution of digital content by enabling the insertion of a plurality of digital watermarks, without the knowledge of the encryption/decryption keys, into a digital host content that has been encrypted with an encryption key. The embedded watermarks persist throughout the content subsequent to the decryption of the content. The disclosed techniques are applicable to content that has been encrypted using a variety of different encryption techniques and algorithms, including stream ciphers, block ciphers, symmetric and asymmetric encryption algorithms. These methods are further adapted to enable the insertion of watermarks into a content that is compressed prior to encryption.
185 Citations
31 Claims
-
1. A method for embedding auxiliary information symbols in an encrypted host content signal, comprising:
-
encrypting a first version of a host content signal embedded with a first logical value to produce a first encrypted signal;
encrypting a second version of the host content signal embedded with a second logical value to produce a second encrypted signal; and
combining a first set of segments from said first encrypted signal with a second set of segments from said second encrypted signal in a pre-defined manner to produce a composite encrypted host content with embedded auxiliary information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for embedding auxiliary information symbols in an encrypted host content signal, comprising:
-
encrypting a first version of an original host content signal embedded with a first logical value to produce a first encrypted signal;
producing a second signal comprising information corresponding to said first logical value and a second logical value embedded in the host content signal; and
combining a first set of segments from said first encrypted signal with a second set of segments from said second signal in a pre-defined manner to produce a composite encrypted host content with embedded auxiliary information. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A method for embedding auxiliary information symbols in an encrypted host content signal, comprising:
-
encrypting the host content signal to produce an unmarked encrypted host content signal;
producing a first signal comprising information corresponding to a first logical value embedded in the host content signal;
producing a second signal comprising information corresponding to a second logical value embedded in the host content signal;
selecting a first set of segments from said first signal;
selecting a second set of segments from said second signal;
combining said first set and said second set of segments with said unmarked encrypted host content in a predefined manner to produce a composite encrypted host content with embedded auxiliary information. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A method for embedding auxiliary information symbols in a compressed and encrypted host content signal, comprising:
-
encrypting a first version of a compressed host content signal embedded with a first logical value to produce a first encrypted signal;
producing a second signal comprising information corresponding to said first logical value and a second logical value embedded in the compressed host content signal; and
combining a first set of segments from said first encrypted signal with a second set of segments from said second signal in a pre-defined manner to produce a composite encrypted host content with embedded auxiliary information. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29)
-
-
30. A method for embedding auxiliary information into an encrypted host signal, comprising:
-
receiving a first signal comprising an encrypted first version of a host signal, receiving a second signal comprising information related to first and second logical values embedded in a second version of said host signal;
combining at least portions of said second signal with said first signal in a pre-defined manner to produce a composite encrypted host signal with embedded auxiliary information.
-
-
31. A method for embedding auxiliary information into an encrypted host signal, comprising:
-
receiving an information signal corresponding to first and second logical values embedded into a first version of the host signal from a pre-processing center; and
combining said information signal with an encrypted second version of the host signal in a pre-defined manner to produce a composite encrypted host signal with embedded auxiliary information.
-
Specification