Method of using plural watermarks to prevent unauthorized image copying
First Claim
Patent Images
1. A digital content processing method comprising the steps of:
- adding information by using a plurality of copyright protection processes on the same digital content; and
outputting the processed digital content,wherein each of the plurality of copyright protection processes differs in difficulty of being analyzed,wherein the plurality of copyright protection processes include a confidential copyright protection process and a non-confidential copyright protection process,wherein information added by the confidential copyright protection process contains both first and second information and information added by the non-confidential copyright protection process contains the first information,wherein it can be determined that an illegal process has been performed on the digital content when the first information added by the confidential copyright protection process can be extracted from the digital content and the first information added by the non-confidential copyright protection process cannot be extracted, andwherein the second information includes information that can identify the person who performed the illegal process on the digital content.
1 Assignment
0 Petitions
Accused Products
Abstract
An increasing number of people are employing a variety of methods of editing and processing digital content in an effort to illegally copy the content. It is difficult to develop digital watermark technology that is able to withstand all types of editing and processing. The present invention addresses the foregoing problems by providing a digital content processing method comprising performing a plurality of copyright protection processes on digital content, each copyright protection process differing in difficulty of being analyzing, and distributing the processed digital content.
-
Citations
36 Claims
-
1. A digital content processing method comprising the steps of:
-
adding information by using a plurality of copyright protection processes on the same digital content; and outputting the processed digital content, wherein each of the plurality of copyright protection processes differs in difficulty of being analyzed, wherein the plurality of copyright protection processes include a confidential copyright protection process and a non-confidential copyright protection process, wherein information added by the confidential copyright protection process contains both first and second information and information added by the non-confidential copyright protection process contains the first information, wherein it can be determined that an illegal process has been performed on the digital content when the first information added by the confidential copyright protection process can be extracted from the digital content and the first information added by the non-confidential copyright protection process cannot be extracted, and wherein the second information includes information that can identify the person who performed the illegal process on the digital content. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer program product, comprising a computer readable medium having computer program codes, for processing digital content, said codes including:
-
performing procedure codes for adding information by using a plurality of copyright protection processes on the same digital content, wherein the processed digital content is distributed, wherein each of the plurality of copyright protection processes differs in difficulty of being analyzed, wherein the plurality of copyright protection processes include a confidential copyright protection process and a non-confidential copyright protection process, wherein information added by the confidential copyright protection process contains both first information and second information and information added by the non-confidential copyright protection process contains the first information, wherein it can be determined that an illegal process has been performed on the digital content when the first information added by the confidential copyright protection process can be extracted from the digital content and the first information added by the non-confidential copyright protection process cannot be extracted, and wherein the second information includes information that can identify the person who performed the illegal process on the digital content. - View Dependent Claims (7, 8)
-
-
9. A digital content processing method comprising the steps of:
-
performing a plurality of copyright protection processes on the same digital content; outputting a first extracting unit for part of the plurality of copyright protection processes; extracting information from the digital content using the first extracting unit for part of the plurality of copyright protection processes and a second extracting unit for the remaining copyright protection processes, wherein the first extracting unit is for extracting first information and the second extracting unit is for extracting both the first information and second information, wherein it can be determined that an illegal process has been performed on the digital content when the first information can be extracted from the digital content using the second extracting unit but not using the first extracting unit, and wherein the second information includes information that can identify the person who performed the illegal process on the digital content. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A computer program product, comprising a computer readable medium having computer program codes, for processing digital content, said codes including:
-
code for performing a plurality of copyright protection processes on the same digital content, wherein information is extracted from the digital content using a first extracting unit for part of the copyright protection processes and using a second extracting unit for the remaining copyright protection processes, wherein the the first extracting unit is for extracting first information and the second extracting unit is for extracting both the first information and second information, wherein it can be determined that an illegal process has been performed on the digital content when the first information can be extracted from the digital content using the second extracting unit but not using the first extracting unit, and wherein the second information includes information that can identify the person who performed the illegal process on the digital content.
-
-
16. A valuable paper processing method comprising the steps of:
-
adding information by using a plurality of counterfeit prevention processes in the same valuable paper; and outputting the processed valuable paper, wherein each of the plurality of counterfeit prevention processes differs in difficulty of being analyzed, wherein the plurality of counterfeit prevention processes include a confidential counterfeit prevention process and a non-confidential counterfeit prevention process, wherein information added by the confidential counterfeit prevention process contains both first and second information and information added by the non-confidential counterfeit prevention process contains the first information, wherein it can be determined that an illegal process has been performed on the valuable paper when the first information added by the confidential counterfeit prevention process can be extracted from the valuable paper and the first information added by the non-confidential counterfeit prevention process cannot be extracted, and wherein the second information includes information that can identify the person who performed the illegal process on the valuable paper. - View Dependent Claims (17)
-
-
18. A computer program product, comprising a computer readable medium having computer program codes, for processing valuable paper, said codes including:
-
code for adding information by using a plurality of counterfeit prevention processes in the same valuable paper, wherein the processed valuable paper is output, wherein each of the plurality of counterfeit prevention processes differs in difficulty of being analyzed, wherein the plurality of counterfeit prevention processes include a confidential counterfeit prevention process and a non-confidential counterfeit prevention process, wherein information added by the confidential counterfeit prevention process contains both first and second information and information added by the non-confidential counterfeit prevention process contains the first information, wherein it can be determined that an illegal process has been performed on the valuable paper when the first information added by the confidential counterfeit prevention process can be extracted from the valuable paper and the first information added by the non-confidential counterfeit prevention process cannot be extracted, and wherein the second information includes information that can identify the person who performed the illegal process on the valuable paper.
-
-
19. A valuable paper processing method comprising the steps of:
-
performing a plurality of counterfeit prevention processes in the same valuable paper; outputting a first extracting unit for part of the plurality of counterfeit prevention processes; extracting information from the valuable paper using the first extracting unit for part of the counterfeit prevention processes and a second extracting unit for the remaining counterfeit prevention processes, wherein the first extracting unit is for extracting first information and the second extracting unit is for extracting both the first information and second information, wherein it can be determined that an illegal process has been performed on the valuable paper when the first information can be extracted from the valuable paper using the second extracting unit but not using the first extracting unit, and wherein the second information includes information that can identify the person who performed the illegal process on the valuable paper. - View Dependent Claims (20, 21, 22, 23)
-
-
24. A computer program product, comprising a computer readable medium having computer program codes, for processing valuable paper, said codes including:
-
codes for performing a plurality of counterfeit prevention processes in the same valuable paper, wherein information is extracted from the valuable paper using a first extracting unit for part of the counterfeit prevention processes, which include a confidential counterfeit prevention process, and using a second extracting unit for the remaining counterfeit prevention processes, which include a non-confidential counterfeit prevention process, wherein information embedded by the confidential counterfeit prevention process contains both first and second information and information embedded by the non-confidential counterfeit prevention process contains the first information, wherein it can be determined that an illegal process has been performed on the valuable paper when the first information added by the confidential counterfeit prevention process can be extracted from the valuable paper and the first information added by the non-confidential counterfeit prevention process cannot be extracted, and wherein the second information includes information that can identify the person who performed the illegal process on the valuable paper.
-
-
25. A processing method comprising the steps of:
-
a first embedding step for embedding a digital watermark in digital content; a second embedding step for embedding a digital watermark in a manner more robust than the first embedding step in the digital content; and outputting the digital content embedded with the digital watermarks which are embedded by the first embedding step and the second embedding step, wherein the first embedding step uses a non-confidential process and the second embedding step uses a confidential process, wherein the first embedding step and the second embedding step are each used to embed a digital watermark including first information, and the second embedding step is further used to embed a second digital watermark including second information that is different from the first information, wherein it can be determined that an illegal process has been performed on the digital content when the first information added by the confidential process can be extracted from the digital content and the first information added by the non-confidential process cannot be extracted, and wherein the second information includes information that can identify the person who performed the illegal process on the digital content. - View Dependent Claims (26, 27, 28, 29, 30, 31)
-
-
32. A computer program product, comprising a computer readable medium having computer program codes, for distributing digital content, said codes including:
-
a first embedding procedure code for embedding a digital watermark in digital content; a second embedding procedure code for embedding a digital watermark in a manner more robust than the first embedding step in the digital content, and outputting the digital content embedded with digital watermarks which are embedded by the first embedding step and the second embedding step, wherein the first embedding step uses a non-confidential process and the second embedding step uses a confidential process, wherein the first embedding step and the second embedding step are each used to embed a digital watermark including first information, and the second embedding step is further used to embed a second digital watermark that includes second information that is different from the first information, wherein it can be determined that an illegal process has been performed on the digital content when the first information added by the confidential process can be extracted from the digital content and the first information added by the non-confidential process cannot be extracted, and wherein the second information includes information that can identify the person who performed the illegal process on the digital content.
-
-
33. A processing system comprising:
-
first embedding means for embedding a digital watermark in digital content; second embedding means for embedding a digital watermark in a manner more robust than the first embedding step in the digital content; and outputting means for outputting the digital content embedded with digital watermarks which are embedded by the first embedding step and the second embedding step, wherein the first embedding step uses a non-confidential process and the second embedding step uses a confidential process, wherein the first embedding step and the second embedding step embed a digital watermark including first information, and the second embedding step is further used to embed a second digital watermark that includes second information that is different from the first information, wherein it can be determined that an illegal process has been performed on the digital content when the first information added by the confidential process can be extracted from the digital content and the first information added by the non-confidential process cannot be extracted, and wherein the second information includes information that can identify the person who performed the illegal process on the digital content.
-
-
34. A processing method comprising the steps of:
-
a first embedding step for embedding a digital watermark in valuable paper; a second embedding step for embedding a digital watermark in a manner more robust than the first embedding step in the valuable paper; and outputting the valuable paper embedded with digital watermarks which are embedded by the first embedding step and the second embedding step, wherein the first embedding step uses a non-confidential process and the second embedding step uses a confidential process, wherein the first embedding step and the second embedding step each are used to embed a digital watermark including first information, and the second embedding step is further used to embed a second digital watermark that includes second information that is different from the first information, wherein it can be determined that an illegal process has been performed on the valuable paper when the first information added by the confidential process can be extracted from the valuable paper and the first information added by the non-confidential process cannot be extracted, and wherein the second information includes information that can identify the person who performed the illegal process on the valuable paper.
-
-
35. A computer program product, comprising a computer readable medium having computer program codes, for circulating valuable paper, said codes including:
-
a first embedding procedure code for embedding a digital watermark in valuable paper; and a second embedding procedure code for embedding a digital watermark in a maimer more robust than the first embedding step in the valuable paper, wherein the valuable paper embedded with digital watermarks using both the first embedding step and the second embedding step is output, wherein the first embedding step uses a non-confidential process and the second embedding step uses a confidential process, wherein the first embedding step and the second embedding step are each used to embed a digital watermark that includes first information, and the second embedding step is further used to embed a second digital watermark that includes second information that is different from the first information, wherein it can be determined that an illegal process has been performed on the valuable paper when the first information added by the confidential process can be extracted from the valuable paper and the first information added by the non-confidential process cannot be extracted, and wherein the second information includes information that can identify the person who performed the illegal process on the valuable paper.
-
-
36. A processing system comprising:
-
first embedding means for embedding a digital watermark in valuable paper; and second embedding means for embedding a digital watermark in a manner more robust than the first embedding step in the valuable paper; and wherein the valuable paper embedded with digital watermarks embedded using both the first embedding step and the second embedding step is output, wherein the first embedding step uses a non-confidential process and the second embedding step uses a confidential process, wherein the first embedding step and the second embedding step are each used to embed a digital watermark including first information, and the second embedding step is further used to embed a second digital watermark that includes second information is different from the first information, wherein it can be determined that an illegal process has been performed on the valuable paper when the first information added by the confidential process can be extracted from the valuable paper and the first information added by the non-confidential process cannot be extracted, and wherein the second information includes information that can identify the person who performed the illegal process on the valuable paper.
-
Specification