Layered security in digital watermarking
First Claim
1. A system comprising:
- one or more processors configured to;
compute a hash of information on a media object;
generate a pattern from the hash;
compute a content signature from a media signal in the media object;
combine the content signature and the pattern to form a content dependent pattern; and
embed the content dependent pattern as a digital watermark into the media object.
5 Assignments
0 Petitions
Accused Products
Abstract
A media object authentication system uses layers of security features based on digital watermarks embedded in media objects. The system generates a first digital watermark with a message payload carrying data about the object, such as a hash of text data printed on the object. The first digital watermark is combined with a content signature derived from features of the media object, such as frequency domain attributes, edge attributes, or other filtered version of the media signal (e.g., image photo on a secure document) on the media object. This combination forms a new digital watermark signal that is embedded in the host media object. To verify the object, the digital watermark payload is extracted and compared with the data about the object. The combined digital watermark and content signature is also evaluated to authenticate the media signal on the media object.
-
Citations
30 Claims
-
1. A system comprising:
one or more processors configured to; compute a hash of information on a media object; generate a pattern from the hash; compute a content signature from a media signal in the media object; combine the content signature and the pattern to form a content dependent pattern; and embed the content dependent pattern as a digital watermark into the media object. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
17. A system comprising:
one or more processors configured to; compute a first pattern; derive a content dependent signature from a media signal in a media object; combine the content dependent signature and the first pattern to form a content dependent pattern; and measure the content dependent pattern embedded as a digital watermark in the media signal to provide a measurement of authenticity of the media signal. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
29. A non-transitory computer-readable medium having instructions stored thereon, the instructions comprising:
-
instructions to compute a hash of information on a media object; instructions to generate a pattern from the hash; instructions to compute a content signature from a media signal in the media object; instructions to combine the content signature and the pattern to form a content dependent pattern; and instructions to embed the content dependent pattern as a digital watermark into the media object.
-
-
30. A non-transitory computer-readable medium having instructions stored thereon, the instructions comprising:
-
instructions to compute a first pattern; instructions to derive a content dependent signature from a media signal in a media object; instructions to combine the content dependent signature and the first pattern to form a content dependent pattern; and instructions to measure the content dependent pattern embedded as a digital watermark in the media signal to provide a measurement of authenticity of the media signal.
-
Specification