EP1062585A1 - Verfahren und gerät zum kamouflieren von daten - Google Patents

Verfahren und gerät zum kamouflieren von daten

Info

Publication number
EP1062585A1
EP1062585A1 EP98915102A EP98915102A EP1062585A1 EP 1062585 A1 EP1062585 A1 EP 1062585A1 EP 98915102 A EP98915102 A EP 98915102A EP 98915102 A EP98915102 A EP 98915102A EP 1062585 A1 EP1062585 A1 EP 1062585A1
Authority
EP
European Patent Office
Prior art keywords
data
elements
data element
data elements
steganographic encoding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP98915102A
Other languages
English (en)
French (fr)
Inventor
Anthony Tung Shuen Nanyang Technological Uni. HO
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Datamark Technologies Pte Ltd
Original Assignee
Datamark Technologies Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Datamark Technologies Pte Ltd filed Critical Datamark Technologies Pte Ltd
Publication of EP1062585A1 publication Critical patent/EP1062585A1/de
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/90Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using coding techniques not provided for in groups H04N19/10-H04N19/85, e.g. fractals
    • H04N19/98Adaptive-dynamic-range coding [ADRC]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32203Spatial or amplitude domain methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3243Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of type information, e.g. handwritten or text document
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3269Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3274Storage or retrieval of prestored additional information

Definitions

  • the present invention relates generally to encoding methods, and more particularly to a method and apparatus for steganographic encoding of data.
  • the encoding method is espartially suited to digital camouflaging of audio, still image and video data and it will be convenient to describe the method and associated apparatus in relation to that example application. It should be appreciated, however, that the invention is intended for broader application and use.
  • the encoding method of the present invention may also be used in the field of data encryption.
  • Rhoads discloses methods to impress an identification code on a carrier, such as an electronic data signal or a physical medium, in a manner that permits the identification code to be later discerned and the carrier thereby identified.
  • Sandford and Handel disclose a method of embedding auxiliary information into host data, such as a photograph, television signal, facsimile transmission, or identification card. The method operates by manipulating a noise component of the host data in accordance with the auxiliary information.
  • steganography is intended to denote any of various methods seeking to conceal the existence of a message within some other medium such that any unintended party who intercepts the 2 medium does not know it contains the concealed message and does not therefore obtain the information contained in the message.
  • Digital watermarking is one example of a steganographic method used to embed secondary data, such as text, in primary or host data, such as a digitized image.
  • the word “cryptography” is intended to denote any of various techniques seeking to hide information contained in a message such that when the message is transmitted from a sender to a receiver any third party intercepting the message cannot read it or extract the information contained in the message.
  • the word "camouflaging” is intended to denote a steganographic encoding method which conceals secondary data by utilizing a combination of primary or host data and key data.
  • the encoding method may not actually embed information in the primary data, as in watermarking, but may utilize information elements existing in the primary data.
  • a steganographic encoding method and apparatus which may allow a relatively long string of secondary data (such as text) to be camouflaged in association with primary data (such as image, audio or video data) whilst producing minimal degradation of the primary or host data.
  • the primary data may be absolutely unaltered by the encoding process.
  • many potential consumer, commercial and service applications may benefit from the use of 3 digital camouflaging/watermarking technology, both for copyright protection purposes and for secure transmission of information. These applications include encoding of text containing ownership identification or attribute information associated with digital still or video cameras, copyright protection and royalty tracking of sound recordings in the music industry.
  • Commercial and service sectors may also benefit from secure transmission and reception of sensitive information that could be camouflaged in normal data streams transmitted through an open channel.
  • the present invention provides a method of steganographic encoding including the steps of:
  • the address of the matching first data element may be stored as a key element associated with the second data element.
  • a string of key elements (containing addresses) may be associated with a corresponding string of second data elements.
  • the string of key elements may specify where in the primary data each second data element of the secondary data is to be found.
  • the secondary data may in this context be considered to be camouflaged in the primary data and the key data.
  • Unique key data which is generated for given primary and secondary data may be stored for use in a complementary decoding method which is 4 described below.
  • the primary and secondary data may be represented digitally. However, in its broadest aspects, the invention is applicable to any form of data representation or notation using any convenient set of symbols.
  • the primary data may represent a still image, motion video, audio, text or other type of information.
  • the secondary data may represent a still image, motion video, audio, text or other information.
  • the secondary data includes a text message and each second data element includes an alphanumeric character. The alphanumeric characters may be used to compose the text message.
  • the text message may include copyright information relating to the image, video, audio, etc. contained in the primary data.
  • the text message may include one or more of the following: a title, an artist, a copyright holder, a body to which royalties should be paid, and general terms of publisher distribution.
  • the primary data may include a still image.
  • the first data elements may be arranged in a two-dimensional array wherein each first data element defines a characteristic associated with a still image element.
  • the first data elements are obtained from a stream of data representing a digitised still image.
  • the image may be obtained from a still digital camera, a computer game or other software, or other source. It may be a grayscale or color image, for example, and may be stored in any known format, eg. BMP, GIF, TIFF, or JPEG.
  • the primary data may alternatively or additionally include motion video.
  • the first data elements may be arranged in a three-dimensional array wherein each first data element defines a characteristic associated with a motion video element.
  • the first data elements are obtained from a stream of data representing digitised motion video.
  • the digitised video may be obtained from a Video Compact Disc (VCD) player, a Laser Disc (LD) player, a computer game or other software, a Digital Versatile Disc (DVD) player or other source, and may be stored in any known format, eg. MPEG.
  • the primary data may alternatively or additionally include audio 5 information.
  • the first data elements may be arranged in a one-dimensional array wherein each first data element defines a characteristic associated with a digital audio sample.
  • the digital audio samples are obtained from a stream of data representing digitised sound or music.
  • the digitised sound may be obtained from a Compact Disc (CD) player, Digital Audio Tape (DAT) player, Laser Disc player, Video Compact Disc (VCD) player or other source, and may be stored in any known format eg. WAV, AIFF, etc.
  • the digital audio samples are obtained from two streams of data representing two channels of digitised sound for stereo reproduction.
  • the first and second data elements may be represented by integer values and step (C) may further include: when a match is not found for the content of a second data element;
  • the method may further include:
  • a search is conducted to locate values 104 or 106. If one of these values is found, the address of the first data element containing that value is stored in a key element, and the content of the first data element (104 or 106) is replaced with the value 105. If on the other hand the values 104 or 106 are not found, a 6 search is conducted for values 103 or 107.
  • This modification of the primary data may be considered to be a form of embedding of the secondary data in the primary data, in the watermarking sense, but is only performed in the relatively rare event that a desired integer value is not found in the primary data. It has been found that these rarely occurring changes are imperceptible in the modified primary image, video or audio data.
  • the modified version of the primary data may subsequently be stored for distribution via the internet or other means.
  • the modified primary data contains the secondary data which can be extracted at any future time using the associated key data generated during the encoding process.
  • the encoding method may include "data shifting" steps prior to step (C).
  • the data shifting steps may be required whenever the range for the secondary data does not fall within the range for the primary data. This may occur for example when the primary data is a digitised audio signal and the secondary data is a text message. Similar data shifting steps may be applied to other types of data.
  • the data shifting steps may include: determining a range for the contents of the first data elements, determining a range for the contents of the second data elements, comparing the range for the first data elements with the range for the second data elements, shifting the contents of the second data elements when the range for the second data elements falls outside of the range for the first data elements, such that the range for the second data elements falls substantially within the range for the first data elements, and using the shifted second data elements as the second data elements in step (C).
  • the step of determining a range for the contents of the first data elements includes: calculating a mean and standard deviation for the first data elements; and determining a lower limit for the first data elements based on the mean and standard deviation.
  • the step of determining a range for the contents of the second data elements may include establishing as a reference a minimum 7 value which can be attributed to the range of possible second data elements.
  • the step of comparing may include calculating an offset value by subtracting the reference value from the lower limit, and the step of shifting may include adding the offset value to the contents of each second data element.
  • the offset value is stored with the key elements in the key data.
  • the complementary decoding method should also include steps to reverse the data shifting offset.
  • the offset value may be retrieved from the key data.
  • the present invention has the distinct advantage that long sentences of text may be camouflaged. Even with long text strings, the integrity of the primary data is in most cases not affected or compromised.
  • the primary data may remain absolutely unchanged by the encoding method because the method utilises data already present in the primary data. Even in those cases where specific values contained in the secondary data cannot be found in the primary data, and the primary data is modified to insert those values, the primary data may remain substantially unaltered.
  • the present invention provides a method of steganographic decoding of secondary data including a plurality of second data elements, said secondary data being encoded in key elements in association with primary data, said method including the steps of:
  • the present invention provides an apparatus for steganographic encoding including:
  • (C) means for searching, for each second data element, a first data element which matches content of the second data element
  • (D) means for generating a key element including the address of the matching first data element when a match is found for the content of the second data element.
  • the present invention provides an apparatus for steganographic decoding of secondary data including a plurality of second data elements, said secondary data being encoded in key elements in association with primary data, said apparatus including:
  • A means for providing said primary data containing a plurality of addressable first data elements
  • B means for providing said key elements, each key element including an address of a first data element
  • (C) means for generating a second data element for each key element by extracting the content of the addressed first data element.
  • the method of encoding described above may be applied to cryptography.
  • a hidden message may be transmitted from a sender to a receiver.
  • the message may be encoded in the key elements which are generated by the method in association with the primary data.
  • the message to be hidden in this case corresponds to the second data elements.
  • the hidden message may be decoded by the receiver from the key elements by utilizing the primary data in a complementary decoding method.
  • Figure 1A illustrates a one dimensional data array containing integer values representing a digitised audio signal
  • Figure 1 B illustrates a two dimensional data array containing integer values representing a digital still image
  • Figure 2 illustrates an example of an audio signal
  • Figure 3 illustrates an example of a digital image
  • Figure 4 illustrates a table of the ASCII character set
  • Figure 5 illustrates a typical greyscale histogram for a digital image
  • Figures 6A and 6B illustrate a two dimensional data array of 4 x 8 data elements representing pixels of a greyscale image
  • Figure 7 is a schematic block diagram of a digital camouflaging apparatus according to the present invention.
  • Figure 8 is a pseudocode of the digital camouflaging text encoder
  • Figure 9 is a pseudocode of the digital camouflaging text decoder
  • Figure 10 is a pseudocode of the spatial location program used in the encoding process shown in Figure 8;
  • Figure 11 illustrates an example of digital camouflaging of an alphanumeric text message in an image;
  • Figure 12 illustrates an entire English text paragraph which is camouflaged in the image of Figure 11.
  • Figure 1A illustrates a one dimensional data array containing integer values which may, for example, represent a digital audio signal (speech or music) 10 sampled under a conventional digital sound format.
  • Figure 1B illustrates a two dimensional data array containing integer values which may, for example, represent a digital still image in GIF or JPEG format, or a video frame in MPEG format.
  • Figure 2 illustrates a typical digital sampled audio waveform (music) in
  • FIG. 3 illustrates a typical 8 bit greyscale image of 512 x 512 pixels.
  • Digital camouflaging may be described as analogous to natural camouflaging, where the camouflaged object (for example a leaf, insect or reptile) conceals itself completely into the surrounding environment.
  • digital camouflaging conceals secondary data, such as an alphanumeric text string in integer form, in primary data, such as an image, by locating the spatial positions of integer values that match the text string values.
  • Figure 4 illustrates a table of the ASCII character set.
  • the digits at the left of the table are the left digits of the decimal equivalent (0 - 127) of the character code, and the digits at the top of the table are the right digits of the character code.
  • the character code for "F” is 70
  • the character code for "&" is 38.
  • the commonly used alphanumeric codes for text strings are as follows: 48 to 57 represent the numeric values "0 - 9", 65 to 90 represent the upper case alphabet "A - Z", and
  • 97 to 122 represent the lower case alphabet "a - z".
  • the present invention may be applied to many different data formats for audio, image and video data.
  • a histogram distribution for most natural images, such as human faces or landscapes would span a wide range of greyscale levels. For example, an 8 - bit or 256 grey level image would contain image pixel values between 0 and 255.
  • Figure 5 illustrates a typical image histogram. It can be seen that a wide spread of pixel values is available in the image for exact matching to alphanumeric character codes to be camouflaged. It can also be seen that a large number of pixels at different spatial locations within the image have the same integer value. For example, the value 105 appears in approximately 2500 11 pixels in the image.
  • a search for an exact matching of this character to an image pixel is first performed. Once the pixel value is found, the address of the spatial location of the pixel is stored in a key element. However, more than one pixel containing the same value as the alphanumeric character value is likely to arise. When this occurs, the encoding method will preferably select the first pixel that it finds. The address of this pixel will form an important part of key data that will later be used to decode the camouflaged alphanumeric character text string. Table 1 gives an example of an alphanumeric text string "This is an Example" and the corresponding integer values.
  • Figures 6A and 6B show an example of a two-dimensional data array representing pixel values of a 4 x 8 pixel image.
  • the terms (1 , 1), (1 , 2), (4, 8) 12 are spatial location addresses of the pixels in the image. These addresses are stored as key elements when the alphanumeric character values are matched to pixel values during searching. For example, in the encoding process, the first alphanumeric character "T" with its integer value of 84 (shown in bold in Figure 6A) would match the values of pixels located at (3,1) and (2, 8). The address of the first location (3, 1) will be stored in a corresponding key element for later use in the complementary decoding process.
  • the present invention will perform a new search for an adjusted value that is one pixel off either side of the character value.
  • the address of the pixel containing the adjusted value is then stored as the key element. For example, if the first alphanumeric character of the text string is a "T", with an integer value of 84, when the search of the pixel values does not locate a single value of 84, a new search would commence to locate values 83 or 85. These values correspond to alphanumeric characters of "S" and "U", respectively.
  • the new search when the new search locates a pixel having a value of 83 or 85 it will first check whether that pixel has already been used. If so, and providing that the same pixel values occur at other addresses, the encoding method will select another pixel having the value of 83 or 85. Once such a pixel has been found, the pixel value is overwritten with the character value of 84.
  • a second search commences to locate a pixel value having a new adjusted value, of 2 pixel values off either side of the character value (ie. 82 and 86 in the present example). The matching and overwriting steps are then repeated as before.
  • the complementary decoding process is relatively straight forward as it uses the unique key data generated from the spatial location addresses of pixels that match the alphanumeric characters composing the text string.
  • the unique key data provides the addresses of the spatial locations from which the camouflaged text string may be extracted from the image.
  • the key data is unique to a specific text string and specific image. If the key data is applied to another image, the text string extracted will be just a random sequence of characters.
  • the dynamic range of values of audio samples associated with music or speech may not be as wide as in the case for digital still/video images.
  • the audio integer values may also be in a range that is somewhat different to the range of alphanumeric character values.
  • a slightly different approach is therefore needed for camouflaging of alphanumeric text strings in digital audio data.
  • the present invention may accordingly include an adaptive statistical approach to first determine the dynamic range of the audio samples.
  • the mean ( ⁇ ) and the standard deviation ( ⁇ ) of the audio samples are determined and used to calculate a lower limit of the audio samples.
  • the alphanumeric character set may be adaptively shifted to coincide with the dynamic range of the audio samples.
  • This adaptive statistical approach has proven very robust for embedding alphanumeric text strings into digital audio samples of music and speech.
  • the method steps involved in the adaptive statistical range shifting process are preferably as follows:
  • FIG. 7 there is shown a schematic block diagram of a digital encoding/decoding apparatus according to an embodiment of the present invention.
  • Data samples 10 are encoded with an alphanumeric character string 12 through a data encoding means 14.
  • Encoded data samples 16 and unique key data 18, containing spatial location addresses, are obtained from the data encoding means 14. These two outputs 16, 18 are used in the reverse decoding means 20.
  • the original alphanumeric character string 12 is extracted as 12A from the encoded data samples 16 using the location address contained in the unique key data 18.
  • the encoded data samples 16 remain unchanged or minimally changed as 16A by the decoding means 20.
  • a pseudocode of the digital camouflaging text encoder is shown in Figure 8 and a pseudocode of the digital camouflaging text decoder is shown in Figure 9.
  • a pseudocode of the spatial location program used in the encoding process is shown in Figure 10.
  • the term "unlabelled” is used to refer to the original data and the term “labelled” is used to refer to the encoded data.
  • FIG. 11 An example of the use of the present invention for camouflaging text labels in a digital image is illustrated in Figure 11.
  • a text string containing 83 characters "This example shows an alphanumeric text message camouflaged into the image of Lena.” is camouflaged in the Lena image.
  • the correlation coefficient equals exactly one, indicating that there is no difference between the labelled and unlabelled images.
  • an entire paragraph of English text containing 126 words and 784 characters, as shown in Figure 12 is camouflaged in the same Lena image and, once again, the correlation coefficient is equal to exactly one.
  • camouflaging alphanumeric character text strings into digital data has many potential applications for resolving copyright protection 16 issues in the consumer sector or for secure transmission of messages in the commercial and service sectors.
  • data camouflaging may be incorporated into consumer electronic products, such as digital still/video cameras and, more recently, VCD and DVD players, to authenticate the true ownership of intellectual property rights or product ownership.
  • Another major consumer area for data camouflaging is that of preventing illegal copying and downloading of satellite images, music CD's, and tapes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Software Systems (AREA)
  • Technology Law (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Storage Device Security (AREA)
  • Facsimile Image Signal Circuits (AREA)
EP98915102A 1998-03-18 1998-03-18 Verfahren und gerät zum kamouflieren von daten Withdrawn EP1062585A1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/SG1998/000023 WO1999048006A1 (en) 1998-03-18 1998-03-18 Method and apparatus for camouflaging data

Publications (1)

Publication Number Publication Date
EP1062585A1 true EP1062585A1 (de) 2000-12-27

Family

ID=20429845

Family Applications (1)

Application Number Title Priority Date Filing Date
EP98915102A Withdrawn EP1062585A1 (de) 1998-03-18 1998-03-18 Verfahren und gerät zum kamouflieren von daten

Country Status (5)

Country Link
EP (1) EP1062585A1 (de)
JP (1) JP2002507771A (de)
AU (1) AU6936398A (de)
CA (1) CA2319601A1 (de)
WO (1) WO1999048006A1 (de)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112445539A (zh) * 2019-09-02 2021-03-05 珠海市魅族科技有限公司 识别伪装音乐播放的方法、装置、电子设备和存储介质

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AUPR439501A0 (en) * 2001-04-12 2001-05-17 Set for Study Pty Ltd. System and method for preventing unauthorised copying of electronic document
JP5532473B2 (ja) * 2009-07-29 2014-06-25 谷電機工業株式会社 番地カラーシステム、カラー写真画像を利用した符号化方法および復号化方法、並びに暗号化方法
US9727748B1 (en) * 2011-05-03 2017-08-08 Open Invention Network Llc Apparatus, method, and computer program for providing document security

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5745569A (en) * 1996-01-17 1998-04-28 The Dice Company Method for stega-cipher protection of computer code
EP1798657A3 (de) * 1996-05-15 2011-05-25 Intertrust Technologies Corp Vorrichtung und Verfahren mit Kryptographie für die elektronische Rechteverwaltung von Speichermedien

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO9948006A1 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112445539A (zh) * 2019-09-02 2021-03-05 珠海市魅族科技有限公司 识别伪装音乐播放的方法、装置、电子设备和存储介质

Also Published As

Publication number Publication date
WO1999048006A1 (en) 1999-09-23
CA2319601A1 (en) 1999-09-23
AU6936398A (en) 1999-10-11
JP2002507771A (ja) 2002-03-12

Similar Documents

Publication Publication Date Title
Cox et al. A review of watermarking principles and practices 1
US6983057B1 (en) Methods for embedding image, audio and video watermarks in digital data
Xu et al. Applications of digital watermarking technology in audio signals
EP1256086B1 (de) Verfahren und vorrichtung zum mehrschichtigen data-hiding
US6925342B2 (en) System and method for protecting digital media
US6674861B1 (en) Digital audio watermarking using content-adaptive, multiple echo hopping
US7224819B2 (en) Integrating digital watermarks in multimedia content
AU2010201199B2 (en) Desynchronized fingerprinting method and system for digital multimedia data
Nehru et al. A detailed look of audio steganography techniques using LSB and genetic algorithm approach
US7398395B2 (en) Using multiple watermarks to protect content material
US9349411B2 (en) Digital watermarking and fingerprinting applications for copy protection
KR101088080B1 (ko) 미디어에 워터마크를 삽입하기 위한 시스템, 방법 및 프로세서-판독가능 기록매체
US7496197B2 (en) Method and system for robust embedding of watermarks and steganograms in digital video content
Petitcolas et al. Weaknesses of copyright marking systems
WO2000025203A1 (en) Methods of digital steganography for multimedia data
EP1062585A1 (de) Verfahren und gerät zum kamouflieren von daten
US20040199772A1 (en) System and method for digitally marking a file with a removable mark
US6988201B1 (en) Method and apparatus for watermarking wavetable synthesis architectures
Bandyopadhyay Genetic Algorithm Based Substitution Technique of Image Steganography
Singh et al. A survey on Steganography in Audio
Kankana et al. A robust audio authentication scheme using (11, 7) hamming error correcting code
Verma et al. Review Paper on Security Measures in Digital Watermarking
Agbaje et al. Robustness and Security Issues in Digital Audio Watermarking
Bhadra et al. Keyless, Robust and Cost-Effective Privacy Protection Algorithm for Videos Using Steganography
Imaduddin et al. Real Time Simulation Based on Image Protection Using Digital Watermarking Techniques

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20001017

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): GB

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20011002