Robust watermarking for digital objects
First Claim
Patent Images
1. A method comprising the steps of:
- a) applying a transform to a digital object to generate a transformed digital object comprising a plurality of elements indexed by a first set of arguments;
b) modulating the first set of arguments to selectively replace elements at selected locations within the transformed digital object with other elements from other locations within the transformed digital object to generate a watermarked transformed digital object; and
c) performing an inverse transform of the watermarked transformed digital object to generate a watermarked digital object.
2 Assignments
0 Petitions
Accused Products
Abstract
Method of embedding a watermark in a digital object. The watermark is used to perform argument modulation of a transform of the object. Watermark data is used in the argument of the transform to effectively shift around values in the transform domain.
58 Citations
20 Claims
-
1. A method comprising the steps of:
-
a) applying a transform to a digital object to generate a transformed digital object comprising a plurality of elements indexed by a first set of arguments;
b) modulating the first set of arguments to selectively replace elements at selected locations within the transformed digital object with other elements from other locations within the transformed digital object to generate a watermarked transformed digital object; and
c) performing an inverse transform of the watermarked transformed digital object to generate a watermarked digital object. - View Dependent Claims (2, 3)
-
-
4. A method comprising the steps of:
-
a) transforming a digital object from a first domain f(il, . . .in) to a second domain F(kl, . . . kn); and
b) modulating each argument of the transformed digital object to form a watermarked transformed digital object of the form G(ki, . . . . kn) wherein G(kl, . . .kn)=F(k1+λ
1, . . . kn+λ
n), wherein λ
i=α
i×
wi(ki, . . .kn)−
γ
, wherein wi(kl, . . . .kn) corresponds to the watermark for each argument, ki.- View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
c) performing an inverse transform to generate the digital information incorporating the watermark in the first domain.
-
-
6. The method of claim 4 wherein wi(kl, . . .kn)=w(kl, . . .kn) for 1≦
- i≦
n.
- i≦
-
7. The method of claim 4 wherein n=2.
-
8. The method of claim 4 wherein α
-
i=α
for 1≦
i≦
n.
-
i=α
-
9. The method of claim 8 wherein α
- is constant.
-
10. The method of claim 8 wherein α
- is a function of F(kl, . . .kn).
-
11. The method of claim 8 wherein γ
-
i=γ
for 1≦
i≦
n.
-
i=γ
-
12. The method of claim 11 wherein γ
- is constant.
-
13. The method of claim 11 wherein γ
- is a function of F(kl, . . . kn).
-
14. The method of claim 4 wherein the transform is one of a Fourier, discrete Fourier (DFT), discrete cosine (DCT), discrete sine (DST), Walsh, Hadamard, Hartley, or Wavelet transform.
-
15. A computer storage medium having instructions stored therein for programming a computer to perform the method of claim 4.
-
16. The method of claim 4 further comprising the steps of:
-
c) quantizing the watermarked transformed digital object; and
d) compressing the quantized result.
-
-
17. A method of extracting a watermark embedded in a candidate digital object, comprising the steps of:
-
a) applying a transform to each of an original digital object and the candidate digital object;
b) modulating arguments of a selected one of the transformed original and candidate digital objects in accordance with modulation parameters; and
c) identifying a resulting set of modulation parameters resulting in a minimum difference between the modulated transformed digital object and the other transformed digital object, wherein the resulting set of modulation parameters identify the watermark. - View Dependent Claims (18, 19, 20)
-
Specification