Method and system for protecting digital data from unauthorized copying
First Claim
1. A method of protecting data from unauthorized copying comprising the steps of:
- embedding a watermark signal having a trigger signal into data to be protected to form watermarked data, said watermark and trigger signals being preserved during signal transformation;
providing said watermarked data to a descrambler;
extracting the trigger signal from said watermark signal, and descrambling said watermarked data if said extracted trigger signal has a predetermined value;
further comprising first embedding the trigger signal into the data to be protected to form watermarked data and thereafter scrambling the watermarked data, where said scrambling comprises dividing said watermarked data into groups of data that are combined during said extracting by means of a commutative process.
2 Assignments
0 Petitions
Accused Products
Abstract
Data is protected from unauthorized copying by rescrambling an unauthorized version of the data, but descrambling an authorized version of the data. This is done using a trigger signal. One property of the trigger signal is that it is preserved through signal transformations, such as one or more of compression, decompression, analog to digital conversion, and digital to analog conversion. As a result of this property the trigger signal can be detected in either scrambled or descrambled data. The trigger signal is embedded into the data to form watermarked data. The watermarked data is passed through a descrambler, where the trigger signal, if present, is extracted. A descrambling key and a descrambling algorithm are applied to the watermarked data if the trigger signal is present, but not applied to the watermarked data if the trigger signal is not present.
-
Citations
12 Claims
-
1. A method of protecting data from unauthorized copying comprising the steps of:
-
embedding a watermark signal having a trigger signal into data to be protected to form watermarked data, said watermark and trigger signals being preserved during signal transformation;
providing said watermarked data to a descrambler;
extracting the trigger signal from said watermark signal, anddescrambling said watermarked data if said extracted trigger signal has a predetermined value;
further comprising first embedding the trigger signal into the data to be protected to form watermarked data and thereafter scrambling the watermarked data, where said scrambling comprises dividing said watermarked data into groups of data that are combined during said extracting by means of a commutative process. - View Dependent Claims (2, 3, 4)
-
-
5. An apparatus for protecting data from unauthorized copying comprising:
-
watermark inserter for embedding a watermark having a trigger signal into data to be protected to form watermarked data, said watermark and trigger signals being preserved during signal transformation;
scrambler for scrambling said watermarked data;
trigger extractor disposed for receiving said watermarked data and extracting said trigger signal from said watermark signal; and
descrambler for descrambling said watermarked data when said extracted trigger signal has a predetermined value;
where said scrambler divides said watermarked data into groups of watermarked data that are combined in said trigger extractor by means of a commutative process.
-
-
6. An apparatus for protecting data from unauthorized copying comprising:
-
watermark inserter for embedding a watermark having a trigger signal into data to be protected to form watermarked data, said watermark and trigger signals being preserved during signal transformation;
scrambler for scrambling said watermarked data;
trigger extractor disposed for receiving said watermarked data and extracting said trigger signal from said watermark signal; and
descrambler for descrambling said watermarked data when said extracted trigger signal has a predetermined value;
where said scrambler reorders values within said groups of watermarked data. - View Dependent Claims (8)
-
-
7. An apparatus for protecting data from unauthorized copying comprising:
-
watermark inserter for embedding a watermark having a trigger signal into data to be protected to form watermarked data, said watermark and trigger signals being preserved during signal transformation;
scrambler for scrambling said watermarked data;
trigger extractor disposed for receiving said watermarked data and extracting said trigger signal from said watermark signal; and
descrambler for descrambling said watermarked data when said extracted trigger signal has a predetermined value;
where said groups of watermarked data comprise blocks of watermarked data.
-
-
9. A method of scrambling data comprising the steps of:
scrambling data, said scrambling being based on a predetermined method of detecting a watermark signal in said data, said scrambling being performed by dividing said data into groups of data that are combined during detecting by means of a commutative process. - View Dependent Claims (10, 11, 12)
Specification