Formation and analysis of signals with common and transaction watermarks
First Claim
1. A method for embedding watermarks in a host signal, comprising the steps of:
- forming watermarked copies of the host signal with at least one different transaction watermark and at least one common watermark embedded therein; and
assembling portions of the different watermarked copies according to a transaction code such that an output signal with transaction watermarks that correspond to the transaction code is formed and such that the at least one common watermark can be subsequently used to recover the at least one transaction watermark.
11 Assignments
0 Petitions
Accused Products
Abstract
A system for embedding and detecting digital watermarks, e.g., for copyright protection of digital content distributed via the Internet or other channels. Different copies of content, such as audio data, are formed with a common watermark (CW), and different transaction watermarks (TW). Based on a user transaction request, portions of the different copies of the content are assembled to provide a copy with a unique sequence of TWs associated with the user. A copy of content which is subsequently located can be analyzed to determine if it has been used in a collusion attack, where a pirate attempts to modify the watermarks, e.g., in an averaging or cut-and-splice attack. The CWs are provided in time-aligned intervals of the different copies of the content so they are not modified by the attack. Content from different web sites can be analyzed by first determining if a particular CW is embedded in the content, and, if so, recovering the TW to identify the unauthorized distributor.
-
Citations
47 Claims
-
1. A method for embedding watermarks in a host signal, comprising the steps of:
-
forming watermarked copies of the host signal with at least one different transaction watermark and at least one common watermark embedded therein; and
assembling portions of the different watermarked copies according to a transaction code such that an output signal with transaction watermarks that correspond to the transaction code is formed and such that the at least one common watermark can be subsequently used to recover the at least one transaction watermark. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
the common watermark identifies a distributor of the host signal.
-
-
3. The method of claim 1, wherein:
the transaction code identifies a user that receives the output signal.
-
4. The method of claim 1, wherein:
the transaction code is generated in response to a user request to access the host signal.
-
5. The method of claim 1, comprising the further step of:
storing the watermarked copies for subsequent use in said assembling step.
-
6. The method of claim 1, wherein:
the different transaction watermarks in the watermarked copies define respective different symbols.
-
7. The method of claim 1, wherein:
the transaction watermarks are provided according to different associated steganographic keys.
-
8. The method of claim 1, wherein:
in the watermarked copies, the common watermarks are time-aligned with one another in respective matching signal intervals.
-
9. The method of claim 1, wherein:
in the watermarked copies, the transaction watermarks are time-aligned with one another in respective transaction watermark intervals.
-
10. The method of claim 9, wherein:
in the watermarked copies, the common watermarks are time-aligned with one another in respective matching signal intervals that are interleaved with the respective transaction watermark intervals.
-
11. The method of claim 9, wherein:
a segmentation pattern associated with the transaction code is used in said assembling step to define time intervals during which portions of the watermarked copies are selected to form the output signal.
-
12. The method of claim 1, wherein:
the watermarked copies are provided in a compressed form.
-
13. The method of claim 12, wherein:
said assembling step is responsive to compression frame boundaries of the watermarked copies for forming the output signal.
-
14. An apparatus for embedding watermarks in a host signal, comprising:
-
a plurality of embeddors for forming watermarked copies of the host signal with at least one different transaction watermark and at least one common watermark embedded therein; and
a multiplexer assembly for assembling portions of the different watermarked copies according to a transaction code to form an output signal with transaction watermarks that correspond to the transaction code such that the at least one common watermark can be subsequently used to recover the at least one transaction watermark.
-
-
15. A method for analyzing a watermarked signal with at least one common watermark that identifies a distributor thereof, the method comprising the steps of:
-
using the common watermark to recover a plurality of transaction watermarks of the watermarked signal that define respective symbols thereof;
providing at least one hypothesis transaction code that defines respective symbols thereof;
comparing the symbols of the transaction watermarks to corresponding symbols of the hypothesis transaction code to determine a correspondence therebetween; and
based on said correspondence, determining a probability that the hypothesis transaction code matches a transaction code that is associated with at least some of the transaction watermarks. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
the recovering step comprises the step of obtaining a difference between the watermarked signal and an original signal.
-
-
17. The method of claim 15, wherein the recovering step further comprises the step of:
using the common watermark to align the watermarked signal with a corresponding original signal.
-
18. The method of claim 15, wherein:
the probability is based on a number of the symbols used in said comparing step, and a portion of the symbols of the watermarked signal that match the corresponding symbols of the hypothesis transaction code.
-
19. The method of claim 15, wherein:
the watermarked signal is retrieved from a suspected unauthorized distributor.
-
20. The method of claim 15, wherein:
the watermarked signal is formed, at least in part, by splicing together a plurality of signal portions that comprise respective transaction watermarks that are associated with respective different transaction codes.
-
21. The method of claim 20, wherein:
the plurality of signal portions further include respective common watermarks that are interleaved with the transaction watermarks.
-
22. The method of claim 15, wherein:
the watermarked signal is formed, at least in part, by averaging a plurality of signals that comprise respective transaction watermarks that are associated with respective different transaction codes.
-
23. The method of claim 22, wherein:
the plurality of signals further include respective common watermarks that are interleaved with the transaction watermarks.
-
24. The method of claim 15, comprising the further steps of:
-
providing a plurality of hypothesis transaction codes that define respective symbol thereof;
for each hypothesis transaction code, comparing the symbols of the transaction watermarks to corresponding symbols of the hypothesis transaction code to determine a correspondence therebetween; and
for each hypothesis transaction code, determining a probability based on the correspondence thereof that the hypothesis transaction code matches a transaction code that is associated with at least some of the transaction watermarks.
-
-
25. The method of claim 24, comprising the further step of:
recovering a content identifier from the watermarked signal for use in selecting the plurality of hypothesis transaction codes from a transaction code database.
-
26. The method of claim 25, wherein:
the content identifier is determined according to common watermarks that are interleaved with the transaction watermarks in the watermarked signal.
-
27. An apparatus for analyzing a watermarked signal with at least one common watermark that identifies a distributor thereof, the apparatus comprising:
-
a detector which uses the common watermark to recover a plurality of transaction watermarks of the watermarked signal that define respective symbols thereof;
storage for providing at least one hypothesis transaction code that defines respective symbols thereof;
a comparator for comparing the symbols of the transaction watermarks to corresponding symbols of the hypothesis transaction code to determine a correspondence therebetween; and
an hypothesis testing block for determining, based on said correspondence, a probability that the hypothesis transaction code matches a transaction code that is associated with at least one of the transaction watermarks.
-
-
28. A method for analyzing content that is distributed via a plurality of distribution points in a network, comprising the steps of:
-
obtaining the content from the plurality of distribution points;
retrieving a common watermark from the content;
determining, for each of the distribution points, whether the retrieved common watermark corresponds to a predetermined common watermark code; and
for the content that comprises the retrieved common watermark that corresponds to the predetermined common watermark code;
retrieving a transaction watermark from the content, and identifying a transaction code associated with the transaction watermark. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35)
a first duration of the content is obtained from the distribution points for use in said determining step and said retrieving a transaction watermark step.
-
-
30. The method of claim 28, wherein:
the distribution points are associated with respective web sites in a computer network.
-
31. The method of claim 28, wherein:
the transaction code identifies a distributor of the content.
-
32. The method of claim 28, wherein:
a first duration of the content is obtained from the distribution points for use in said determining step, and a second, longer duration of the content is obtained from the distribution points for use in said retrieving a transaction watermark step.
-
33. The method of claim 32, wherein:
the first duration is at least twice a duration of the common watermark.
-
34. The method of claim 28, comprising the further step of:
comparing the identified transaction code with at least one hypothesis transaction code to determine a correspondence therebetween.
-
35. The method of claim 34, comprising the further step of:
determining, based on the correspondence, a probability that the identified transaction code matches the hypothesis transaction code.
-
36. An apparatus for analyzing content that is distributed via a plurality of distribution points in a network, comprising:
-
a crawler for obtaining the content from the plurality of distribution points;
a common watermark detector for retrieving a common watermark from the content and determining, for each of the distribution points, whether the retrieved common watermark corresponds to a predetermined common watermark code; and
a forensic analysis block for retrieving a transaction watermark from the content, and identifying a transaction code associated with the transaction watermark, for the content that comprises the retrieved common watermark that corresponds to the predetermined common watermark code.
-
-
37. A method for embedding watermarks in a host signal, comprising the steps of:
-
forming watermarked copies of the host signal with at least one different transaction watermark and at least one common watermark embedded therein; and
assembling portions of the different watermarked copies according to a transaction code to form an output signal with transaction watermarks that correspond to the transaction code wherein the common watermarks are time-aligned with one another in respective matching signal intervals. - View Dependent Claims (38, 39)
the transaction watermarks are provided according to different associated steganographic keys.
-
-
39. The method of claim 37, wherein:
in the watermarked copies, the common watermarks are time-aligned with one another in respective matching signal intervals that are interleaved with the respective transaction watermark intervals.
-
40. A method for analyzing a watermarked signal comprising the steps of:
-
recovering a plurality of transaction watermarks of the watermarked signal that define respective symbols thereof, providing a plurality of hypothesis transaction codes that define respective symbols thereof;
for each hypothesis transaction code, comparing the symbols of the transaction watermarks to corresponding symbols of the hypothesis transaction code to determine a correspondence therebetween;
for each hypothesis transaction code, determining a probability based on the correspondence thereof that the hypothesis transaction code matches a transaction code that is associated with at least some of the transaction watermarks; and
recovering a content identifier from the watermarked signal for use in selecting the plurality of hypothesis codes from a transaction code database wherein the content identifier is determined according to common watermark that are interleaved with the transaction watermarks in the watermarked signal. - View Dependent Claims (41, 42, 43)
the watermarked signal is formed, at least in part, by splicing together a plurality of signal portions that comprise respective transaction watermarks, that are associated with respective different transaction codes and that include respective common watermarks which are interleaved with the transaction watermarks.
-
-
42. The method of claim 40, wherein:
the watermarked signal is formed, at least in part, by averaging a plurality of signals that comprise respective transaction watermarks that are associated with respective different transaction codes.
-
43. The method of claim 42, wherein:
the plurality of signals further include respective common watermarks that are interleaved with the transaction watermarks.
-
44. A method for analyzing content that is distributed via a plurality of distribution points in a network, comprising the steps of:
-
obtaining a first duration of the content from the plurality of distribution points;
determining, for each of the distribution points, whether the first duration of content comprises a common watermark that corresponds to a predetermined common watermark code; and
for the content that comprises the common watermark that corresponds to the predetermined common watermark code;
obtaining a second duration of the content from the plurality of distribution points;
retrieving a transaction watermark from the second duration of the content, and identifying a transaction code associated with the transaction watermark. - View Dependent Claims (45, 46, 47)
the first and second durations are equal to on another.
-
-
46. The method of claim 44, wherein:
the second duration is longer than the first duration.
-
47. The method of claim 46, wherein:
the first duration is at least twice a duration of the common watermark.
Specification