Content Authentication and Recovery Using Digital Watermarks
First Claim
Patent Images
1. A computer storage medium on which are stored computer instructions causing a processor programmed thereby to:
- decode an auxiliary signal imperceptibly embedded into a host signal, the host signal representing a first content object;
decompress the decoded auxiliary signal to yield a signal representing a second content object; and
compare the first and second content objects for perceptual similarity, in connection with authenticating the host signal.
6 Assignments
0 Petitions
Accused Products
Abstract
The disclosure describes methods for using digital watermarking to authenticate digital media signals, such as images, audio and video signals. It also describes techniques for using embedded watermarks to repair altered parts of a media signal when alteration is detected. Alteration is detected using hashes, digital watermarks, and a combination of hashes and digital watermarks.
-
Citations
4 Claims
-
1. A computer storage medium on which are stored computer instructions causing a processor programmed thereby to:
-
decode an auxiliary signal imperceptibly embedded into a host signal, the host signal representing a first content object; decompress the decoded auxiliary signal to yield a signal representing a second content object; and compare the first and second content objects for perceptual similarity, in connection with authenticating the host signal.
-
-
2. A method for processing a media signal, comprising the acts:
-
JPEG-compressing a media signal; and embedding data resulting from said compression into the media signal - View Dependent Claims (3)
-
-
4. A method of recovering authenticated host data from processed host data, comprising the acts:
-
identifying three sets of data, A, B and C, within the processed host data; calculating a hash of A and B; decoding auxiliary data imperceptibly embedded in B, and decoding auxiliary data imperceptibly embedded in C; combining the auxiliary data decoded from B, with data A to yield a new set of host data; and judging the new set of host data to be authenticated if the calculated hash matches the auxiliary data decoded from C.
-
Specification