Watermarking in an encrypted domain
First Claim
1. A method for embedding auxiliary information symbols in an encrypted host content, comprising:
- produce a first encrypted content by (a) obtaining a plurality of segments of an original host content, (b) embedding each of said plurality of segments with a first logical value and (c) using a first encryption key or first set of encryption keys for encrypting each of said plurality of segments after having been embedded with said first logical value;
producing a second content that is not in encrypted format by (a) embedding a second logical value into said plurality of segments of said original host content and (b) modifying each particular segment that is embedded with said second logical value with a corresponding segment that is embedded with said first logical value, said corresponding segment being perceptually similar to said particular segment but for having said first logical value embedded therein instead of said second logical value; and
combining a first set of segments from said first encrypted content with a second set of segments from said second content in a pre-defined manner, without decrypting said first encrypted content, to produce a composite encrypted host content with embedded auxiliary information, wherein said composite encrypted host content is decryptable using said first encryption key or said first set of encryption keys.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, apparatus and systems for embedding auxiliary information in encrypted host signals are provided. The present invention enables secure application of digital watermarks at any point in the transmission and/or distribution of digital content by enabling the insertion of a plurality of digital watermarks, without the knowledge of the encryption/decryption keys, into a digital host content that has been encrypted with an encryption key. The embedded watermarks persist throughout the content subsequent to the decryption of the content. The disclosed techniques are applicable to content that has been encrypted using a variety of different encryption techniques and algorithms, including stream ciphers, block ciphers, symmetric and asymmetric encryption algorithms. These methods are further adapted to enable the insertion of watermarks into a content that is compressed prior to encryption.
-
Citations
27 Claims
-
1. A method for embedding auxiliary information symbols in an encrypted host content, comprising:
-
produce a first encrypted content by (a) obtaining a plurality of segments of an original host content, (b) embedding each of said plurality of segments with a first logical value and (c) using a first encryption key or first set of encryption keys for encrypting each of said plurality of segments after having been embedded with said first logical value; producing a second content that is not in encrypted format by (a) embedding a second logical value into said plurality of segments of said original host content and (b) modifying each particular segment that is embedded with said second logical value with a corresponding segment that is embedded with said first logical value, said corresponding segment being perceptually similar to said particular segment but for having said first logical value embedded therein instead of said second logical value; and combining a first set of segments from said first encrypted content with a second set of segments from said second content in a pre-defined manner, without decrypting said first encrypted content, to produce a composite encrypted host content with embedded auxiliary information, wherein said composite encrypted host content is decryptable using said first encryption key or said first set of encryption keys. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for embedding auxiliary information symbols in an encrypted host content, comprising:
-
encrypting original host content using a first encryption key or first set of encryption keys to produce an unmarked encrypted host content; producing a first content that is not in encrypted format by (a) obtaining a plurality of segments of said original host content (b) embedding each of said plurality of segments with a first logical value and (c) modifying each particular segment that is embedded with said first logical value with a corresponding segment from said original host content, said corresponding segment being perceptually similar to said particular segment that is embedded with said first logical value but lacking said embedded first logical value; producing a second content that is not in encrypted format by (a) embedding a second logical value into said plurality of segments of said original host content and (b) modifying each particular segment that is embedded with said first logical value with a corresponding segment from said original host content, said corresponding segment being perceptually similar to said particular segment that is embedded with said second logical value but lacking said embedded second logical value; selecting a first set of segments from said first content; selecting a second set of segments from said second content; and combining said first set and said second set of segments with said unmarked encrypted host content in a predefined manner, without decrypting said unmarked encrypted host content, to produce a composite encrypted host content with embedded auxiliary information, wherein said composite encrypted host content is decryptable using said first encryption key or said first set of encryption keys. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A method for embedding auxiliary information symbols in a compressed and encrypted host content, comprising:
-
producing a first compressed-and-encrypted content by encrypting a first version of a compressed host content, said first version of said compressed host content having been produced by (a) obtaining a plurality of segments of an original host content, (b) embedding each of said plurality of segments with a first logical value, and (c) compressing said plurality of segments subsequent to said embedding of said first logical value; producing a second compressed-and-encrypted content by (a) embedding a second logical value into each of said plurality of segments of said original host content, (b) compressing said plurality of segments subsequent to said embedding of said second logical value, (c) encrypting said plurality of segments subsequent to said compressing and (d) modifying each particular segment that is embedded with said second logical value and subsequently compressed and encrypted with a corresponding segment that is embedded with said first logical value and subsequently compressed and encrypted, said corresponding segment being perceptually similar to said particular segment prior to said compressing but for having said first logical value embedded therein instead of said second logical value; and combining a first set of segments from said first compressed-and-encrypted content with a second set of segments from said second compressed-and-encrypted content in a pre-defined manner, without decrypting or decompressing either the first set of segments or the second set of segments, to produce a composite compressed-and-encrypted host content with embedded auxiliary information. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
-
26. A method for embedding auxiliary information into an encrypted host, comprising:
-
receiving a first content that is in encrypted format, the first content comprising a plurality of embedded segments, each of said plurality of embedded segments corresponding to a segment of an original host content having been embedded with a first logical value and subsequently having been encrypted using a first encryption key or set of encryption keys; receiving a second content that is not in encrypted format, the second content having been produced by (a) embedding a second logical value into said plurality of segments of said original host content and (b) modifying each particular segment that is embedded with said second logical value with a corresponding segment that is embedded with said first logical value, said corresponding segment being perceptually similar to said particular segment but for having said first logical value embedded therein instead of said second logical value; and combining at least portions of said second content with said first content in a pre-defined manner, without decrypting said first encrypted content, to produce a composite encrypted host content with embedded auxiliary information, wherein said composite encrypted host content is decryptable using said first encryption key or said first set of encryption keys.
-
-
27. A method for embedding auxiliary information into an encrypted host content, comprising:
-
receiving a first content and a second content from a pre-processing center, said first content having been produced by (a) obtaining a plurality of segments of an original host content (b) embedding each of said plurality of segments with a first logical value and (c) modifying each particular segment that is embedded with said first logical value with a corresponding segment from said original host content, said corresponding segment being perceptually similar to said particular segment that is embedded with said first logical value but lacking said embedded first logical value, said second content having been produced by (a) embedding a second logical value into said plurality of segments of said original host content and (b) modifying each particular segment that is embedded with said first logical value with a corresponding segment from said original host content, said corresponding segment being perceptually similar to said particular segment that is embedded with said second logical value but lacking said embedded second logical value; and combining said particular segments of first and second contents that are in unencrypted format with segments from an encrypted and unmarked version of said original host content in a pre-defined manner, without decrypting said encrypted and unmarked version of said original host content, to produce a composite encrypted host content with embedded auxiliary information, said encrypted and unmarked version of said original host content having been produced by encrypting segments of said original host content using a first encryption key or first set of encryption keys, wherein said composite encrypted host content is decryptable using said first encryption key or said first set of encryption keys.
-
Specification