Patent classifications
G06T2201/0064
METHOD AND APPARATUS FOR HARDWARE-ENFORCED, ALWAYS-ON INSERTION OF A WATERMARK IN A VIDEO PROCESSING PATH
A method, apparatus, article of manufacture, and a memory structure for inserting a watermark in a media program is described. In an exemplary embodiment, the method comprises the steps of receiving data comprising the media program in the receiver disposed at a subscriber station, generating a watermark, the watermark generated at least in part according to a secure data processor-unique identifier irreversibly stored in the secure data processor, processing the received data to reproduce the media program, and inserting portions of the generated watermark in the reproduced media program at locations determined at least in part according to the secure data processor-unique identifier to produce a watermarked media program provided for display.
Dual watermarking method for trajectory data based on robust watermarking and fragile watermarking
A dual watermarking method for trajectory data based on robust watermarking and fragile watermarking uses an encryption algorithm to construct robust watermark information, and then a farthest pair of feature points in a minimum convex hull of is set as constant points. Further quantization index modulation technology is used to embed robust watermark information into angles constructed from feature points and constant points. Finally, the angles and distance ratios constructed by trajectory points and constant points are used to group trajectory points. Within each group, spatiotemporal attributes of the trajectory points are taken as fragile watermark bits to be embedded in the distance ratios constructed by the trajectory points. A process of watermark detection is consistent with the embedding of watermark information. Watermarks embedded in the trajectory data based on the dual watermarking method have high robustness against translation, rotation, and scaling attacks.
FINGERPRINTING OF DATA
Fingerprinting, including: receiving a plurality of master datasets, each master dataset divided into a plurality of input segments, wherein at least one master dataset of said plurality of master datasets is uniquely marked; selecting a corresponding input segment from one of said plurality of master datasets; storing a segment identifier indicating from which master dataset said selected corresponding input segment was selected; and sending said selected corresponding input segment to a client computer system over a computer network.
Authentication and validation of smartphone imagery
A method, system, and processor-executable software for processing images or video captured by a smartphone or other digital image capture device for subsequent validation and authentication captures not only the image, but also metadata relevant to the authenticity of validity of the image, such as position, time, camera movement and orientation, image parameters, and so forth. The image is watermarked and both the watermarked image and the metadata, as well as a symmetric key used in the watermarking, are digitally signed and transmitted or uploaded to a web server or authentication centric entity for authentication and storage. When a third party submits an image to the web server or authentication centric entity, the submitted image is compared with the stored watermarked image for authentication and validation of the submitted image, and the metadata is then retrieved to enable analysis of the contents of authenticated and validated image.
Authentication and validation of smartphone imagery
A method, system, and processor-executable software for processing images or video captured by a smartphone or other digital image capture device for subsequent validation and authentication captures not only the image, but also metadata relevant to the authenticity of validity of the image, such as position, time, camera movement and orientation, image parameters, and so forth. The image is watermarked and both the watermarked image and the metadata, as well as a symmetric key used in the watermarking, are digitally signed and transmitted or uploaded to a web server or authentication centric entity for authentication and storage. When a third party submits an image to the web server or authentication centric entity, the submitted image is compared with the stored watermarked image for authentication and validation of the submitted image, and the metadata is then retrieved to enable analysis of the contents of authenticated and validated image.
Program encoding and counterfeit tracking system and method
Unique encoding of each of a substantial number of distribution video copies of a program such as a motion picture is produced by altering the images slightly at several pre-selected locations in the program in a uniquely coded pattern. Suspected counterfeits can be compared with an unaltered master video to determine the encoded number for the copy which was counterfeited to enable tracking the source of the counterfeit. Preferably, each frame of several whole scenes is altered at each location by shifting an image so as to make the alterations largely undetectable by counterfeiters but easily detected by comparison with an unaltered master video. Artifacts are inserted in patterns representing a unique number for the program. These supplement the encoding by alteration of images and gives added means to aid in tracing counterfeit copies.
Method and device to embed watermark in uncompressed video data
A system and method to watermark an uncompressed content received at a client device in a compressed form and encrypted by at least one content key, said content key as well as watermark instruction forming Conditional Access Module (CAS) data, said CAS data being encrypted by a transmission key and comprising at least one signature to authenticate the CAS data, said client device comprising a CAS configured to process the CAS data, a descrambler having an input to receive the encrypted compressed content and an output to produce an compressed content, a decoder to convert the compressed content into uncompressed content, a watermark inserter connected to the output of the decoder, a secure activation module connected with the watermark inserter, a secure element connected with the watermark inserter and the secure activation module.
Method and apparatus for hardware-enforced, always-on insertion of a watermark in a video processing path
A method, apparatus, article of manufacture, and a memory structure for inserting a watermark in a media program is described. In an exemplary embodiment, the method comprises the steps of receiving data comprising the media program in the receiver disposed at a subscriber station, generating a watermark, the watermark generated at least in part according to a secure data processor-unique identifier irreversibly stored in the secure data processor, processing the received data to reproduce the media program, and inserting portions of the generated watermark in the reproduced media program at locations determined at least in part according to the secure data processor-unique identifier to produce a watermarked media program provided for display.
Image synthesis device and method for embedding watermark
An image synthesis method includes inputting an original image and a watermark image into a synthesis model and obtaining a synthesized image output from the synthesis model. The original image and the watermark image are respectively processed in first and second sub-models of the synthesis model and then combined, and the concatenated result is processed in a third sub-model to generate the synthesized image.
SECURE IMAGE PIPELINE
Computer-implemented methods and systems for image security in computer vision applications are described. A shared secret is stored at an image sensor module and a trusted element. The shared secret includes a device-specific secret value and a definition of a plurality of pixel locations. An image is received at the image sensor module, which generates a watermark based on the secret value and applies the watermark to the image, based on the pixel locations, to create a watermarked image. The watermarked image is received at the trusted element, which validates the watermarked image based on the watermark.