Asymmetric watermark embedding/extraction
First Claim
1. A method, comprising:
- receiving a host content, the host content comprising embedded watermarks in a first number of embedding opportunities, wherein the first number of embedding opportunities is less than a number of all embedding opportunities within the host content; and
extracting one or more of the embedded watermarks by evaluating no more than a first number of watermark extraction opportunities associated with the host content, whereinthe first number of watermark extraction opportunities is less than a number of all watermark extraction opportunities associated with the host content, andthe relationship between the first number of embedding opportunities, the first number of watermark extraction opportunities and the number of all watermark extraction opportunities is such that a circumvention attempt that overwrites watermarks at all extraction opportunities degrades perceptual quality of the host content below a desired perceptual quality level.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and devices are provided to embed imperceptible watermarks into a host content and to subsequently extract embedded watermarks in a manner so as to achieve desired levels of robustness, transparency and security. For a particular host content, a first number of embedding opportunities are used to insert watermarks, which is less than a number of all embedding opportunities within the host content. Watermarks are extracted from a first number of watermark extraction opportunities, which is less than a number of all watermark extraction opportunities associated with the host content. The relationship between the first number of embedding opportunities, the first number of watermark extraction opportunities and the number of all watermark extraction opportunities is such that a circumvention attempt that overwrites watermarks at all extraction opportunities degrades perceptual quality of the host content below a desired perceptual quality level.
-
Citations
20 Claims
-
1. A method, comprising:
-
receiving a host content, the host content comprising embedded watermarks in a first number of embedding opportunities, wherein the first number of embedding opportunities is less than a number of all embedding opportunities within the host content; and extracting one or more of the embedded watermarks by evaluating no more than a first number of watermark extraction opportunities associated with the host content, wherein the first number of watermark extraction opportunities is less than a number of all watermark extraction opportunities associated with the host content, and the relationship between the first number of embedding opportunities, the first number of watermark extraction opportunities and the number of all watermark extraction opportunities is such that a circumvention attempt that overwrites watermarks at all extraction opportunities degrades perceptual quality of the host content below a desired perceptual quality level. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A device, comprising:
-
a processor and a memory comprising software code that configures the device to; receive a host content, the host content comprising embedded watermarks in a first number of embedding opportunities, wherein the first number of embedding opportunities is less than a number of all embedding opportunities within the host content; and extract one or more of the embedded watermarks by evaluating no more than a first number of watermark extraction opportunities associated with the host content, wherein the first number of watermark extraction opportunities is less than a number of all watermark extraction opportunities associated with the host content, and the relationship between the first number of embedding opportunities, the first number of watermark extraction opportunities and the number of all watermark extraction opportunities is such that a circumvention attempt that overwrites watermarks at all extraction opportunities degrades perceptual quality of the host content below a desired perceptual quality level. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification