Watermarking process resilient to collusion attacks
First Claim
Patent Images
1. A watermarking method, comprising the steps of:
- (a) generating a digital string from the work to form a baseline watermark;
(b) generating a set of watermarks each having a predetermined relationship to the baseline watermark; and
(c) inserting a respective one of the set of watermarks into a respective copy of the work to create a watermarked copy uniquely identified by the respective one of the set of watermarks; and
(d) repeating step (c) at least m times to create a set of m watermarked copied, each having a different one of the set of watermarks therein, such that if a subset of said m watermarked copies are averaged to produce an illicit copy of the work, at least one of the set of watermarks is detectable in the illicit copy.
0 Assignments
0 Petitions
Accused Products
Abstract
A watermarking procedure wherein each of a set of copies of the work has a slightly-modified form of a "baseline" watermark that is placed within a critical region of the data. The slight variations in the watermarks, however, are not perceptually visible and do not interfere with the work. If multiple persons collude to attempt to create an "illicit" copy of the work (i.e., a copy without a watermark), however, at least one of the modified watermarks is present in the copy, thereby identifying both the illicit copy and the copier.
-
Citations
17 Claims
-
1. A watermarking method, comprising the steps of:
-
(a) generating a digital string from the work to form a baseline watermark; (b) generating a set of watermarks each having a predetermined relationship to the baseline watermark; and (c) inserting a respective one of the set of watermarks into a respective copy of the work to create a watermarked copy uniquely identified by the respective one of the set of watermarks; and (d) repeating step (c) at least m times to create a set of m watermarked copied, each having a different one of the set of watermarks therein, such that if a subset of said m watermarked copies are averaged to produce an illicit copy of the work, at least one of the set of watermarks is detectable in the illicit copy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of securing e work against copying, comprising the steps of:
-
(a) generating a set of watermarks each comprising a vector of randomly-generated numbers; and (b) inserting a respective one of the set of watermarks into a respective copy of the work to create a watermarked copy uniquely identified by the respective one of the set of watermarks; and (c) repeating step (b) at least m times to create a set of m watermarked copies, each having a different one of the set of watermarks therein, such that if a subset of said m watermarked copies are averaged to produce an illicit copy of the work, at least one of the set of watermarks is detectable in the illicit copy. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A method of protecting a work against illicit copying, comprising the steps of:
-
(a) generating a set of watermarks each having a predetermined relationship to a first watermark for the work; and (b) inserting a respective one of the set of watermarks into a respective copy of the work to create a watermarked copy uniquely identified by the respective one of the set of watermarks; and (c) repeating step (b) at least m times to create a set of m watermarked copies, each having a different one of the set of watermarks therein, wherein averaging a pair of said m watermarked copies generates a copy of the work in which at least one of the set of watermarks can be detected. - View Dependent Claims (15)
-
-
16. A method of generating secure copies of a document, comprising the steps of:
-
(a) generating a set of watermarks each comprising a vector of randomly-generated numbers with a normal distribution having zero means and unity variance; (b) inserting a respective one of the set of watermarks into a respective copy of the document to create a watermarked copy uniquely identified by the respective one of the set of watermarks; and (c) repeating step (b) at least m times to create a set of m watermarked copies of the document that the secure against illicit copying.
-
-
17. A method of generating secure copies of a document, comprising the steps of:
-
(a) generating a set of watermarks each comprising a vector of randomly-generated numbers; (b) inserting a respective one of the set of watermarks into a respective copy of the document to create a watermarked copy uniquely identified by the respective one of the set vectors; and (c) repeating step (b) at least m times to create a set of m watermarked copies of the document that are secure against illicit copying.
-
Specification