Digital watermark screening and detecting strategies
First Claim
Patent Images
1. A method of using detection values computed from a signal suspected of being watermarked to control watermark detection, the method comprising:
- computing detection values for two or more candidate watermark signals in a suspect signal, where each detection value corresponds to a metric indicating likelihood of a watermark signal in the suspect signal, the watermark signal being detected comprises a set of attributes embedded at locations within the suspect signal, and catch detection value is a measure of the set of attributes;
computing a relative detection value based on an analysis of two or more of the detection values relative to each other, and controlling detector action based on the relative detection value.
6 Assignments
0 Petitions
Accused Products
Abstract
To enhance decoding of signals suspected of containing a watermark, a suspect signal is screened to compute detection values evincing presence and strength of a watermark. Screening strategies control detector actions, such as rejecting un-marked signals and improving synchronization of watermarks in suspect signals.
217 Citations
37 Claims
-
1. A method of using detection values computed from a signal suspected of being watermarked to control watermark detection, the method comprising:
-
computing detection values for two or more candidate watermark signals in a suspect signal, where each detection value corresponds to a metric indicating likelihood of a watermark signal in the suspect signal, the watermark signal being detected comprises a set of attributes embedded at locations within the suspect signal, and catch detection value is a measure of the set of attributes;
computing a relative detection value based on an analysis of two or more of the detection values relative to each other, and controlling detector action based on the relative detection value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
including computing an absolute detection value for at least one candidate watermark signal in the suspect signal; and
controlling detector action based at last in part on the absolute and relative detection values.
-
-
3. The method of claim 2 wherein the detector action comprises screening unmarked signals from further detection action.
-
4. The method of claim 1 including determining whether to reject a suspect signal as being un-marked by comparing the relative detection value to a limit.
-
5. The method of claim 1 including determining whether to reject at least a portion of the suspect signal as being un-marked by two or more screening stages, where a first screening stage tests a set of candidate watermark signals;
- and a subsequent screening stage tests candidate watermark signals that remain after the first screening stage.
-
6. The method of claim 1 including selecting additional candidate watermark signals in the suspect signal based on the detection values;
- and
computing detection values for the additional candidates in an attempt to find candidates that evince a stronger watermark signal.
- and
-
7. The method of claim 6 wherein selecting additional candidate watermark signals comprises refining orientation parameters associated with the candidate watermark signals.
-
8. The method of claim 1 wherein the detection values comprise measures of correlation between a calibration signal and at least portions of the suspect signal.
-
9. The method of claim 1 wherein the detection values comprise a measure of similarity between an expected calibration signal and a calibration signal decoded from at least a portion of the suspect signal.
-
10. The method of claim 1 wherein the relative detection value is used as an indicator of strength of a watermark in the suspect signal.
-
11. The method of claim 1 wherein the relative detection value is used to control use, copying or recording of the suspect signal.
-
12. The method of claim 1 wherein the relative detection value is used to determine whether the suspect signal has been tampered with.
-
13. A computer readable medium on which is stored software for performing the method of claim 1.
-
14. The method of claim 1 wherein the detection values comprise measures of correlation.
-
15. The method of claim 14 wherein the relative detection value comprises a comparison of a top correlation measure with one or more lesser correlation measures.
-
16. A method of using detection values computed from a signal suspected of being watermarked to control watermark detection, the method comprising:
-
computing detection values for two or more candidate watermark signals in a suspect signal, where each detection value corresponds to a metric indicating likelihood of a watermark signal in the suspect signal, the watermark signal being detected comprises a set of attributes embedded at locations within the suspect signal;
computing a relative detection value based on an analysis of two or more of the detection values relative to each other, and controlling detector action based on the relative detection value;
where the candidate watermark signals have corresponding orientation parameters describing orientations of the candidate watermark signals in the suspect signal. - View Dependent Claims (17)
-
-
18. A method of detecting a watermark having a set of attributes embedded at locations within a suspect signal, the method comprising:
-
computing detection values for two or more watermark signal candidates in the suspect signal;
evaluating a first detection metric based on the detection values;
evaluating a second detection metric based on the detection values; and
controlling further detector actions based on the first and second detection metrics;
wherein at least one of the metrics uses criteria indicating whether a valid watermark signal is present that adapts to the suspect signal according to detection values computed from the suspect signal; and
wherein the detection values are each computed as a measure of the set of attributes of the watermark.- View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
comparing a top detection value to a limit, and comparing a top detection value to a one or more lesser detection values or combination of lesser detection values.
-
-
22. The method of claim 18 wherein the detection values are computed for candidate watermark signals and the first and second detection metrics are used as an indicator of strength of a watermark in the suspect signal.
-
23. The method of claim 22 wherein the strength of the watermark is used to determine whether the suspect signal has been transformed.
-
24. The method of claim 22 wherein the strength of the watermark is used to control use, recording or copying of the suspect signal.
-
25. The method of claim 18 wherein the detection values are computed for candidate watermark signals and the first and second detection metrics are used to control use, recording or copying of the suspect signal.
-
26. A computer readable medium on which is stored software for performing the method of claim 18.
-
27. The method of claim 18 wherein the detection values comprise measures of correlation and at least one of the detection metrics comprises an evaluation of relative correlation measures for different candidate watermark signals.
-
28. The method of claim 27 wherein the evaluation includes comparing a top correlation measure with one or more lesser correlation measures.
-
29. A method of watermark detection in a signal suspected of being watermarked comprising:
-
computing two or more features of a suspect signal from different stages of watermark detection; and
combining information from the two or more features to control watermark detector action;
wherein at least one feature provides a measure of watermark signal validity of a watermark signal candidate relative to other watermark signal candidates; and
the at least one feature comprises a comparison of a top detection value of a watermark signal candidate with lesser detection values of other watermark signal candidates.- View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37)
-
Specification