Patent application number | Description | Published |
20080212780 | Homomorphic Encryption For Secure Watermarking - A method and a system for embedding a watermark in a media signal x are disclosed. The method comprises providing an at least partially encrypted media signal c | 09-04-2008 |
20080215889 | Efficient Watermark Detection - A system and a method of effectively detecting watermarks in a significant amount of data signals. The method, in overview, consists in pre-filtering the significant amount of data signals in order to eliminate from the final watermark detection the segments of the data signals which have no significant relevance to the owner of the copyrights of the watermark under investigation, and then performing the actual watermark detection over the remaining segments of data signals relevant to the investigation. The pre-filtering feature being implemented by a definition of one or more goal descriptors, extraction of one or more descriptors from the data signals and its content and a comparison between goal descriptors and extracted descriptors. | 09-04-2008 |
20080221895 | Method and Apparatus for Processing Audio for Playback - A method and apparatus for processing audio for playback to provide a smooth transition between a beginning region of an audio track and an end region of a previous audio track is disclosed. A quantity representative of a chromagram is calculated for each of the audio tracks and the mixing points for the beginning and end regions of each audio track are identified. A quantity representative of a chromagram at the mixing point of the beginning region of the audio track and a quantity representative of a chromagram at the mixing point of the end region of the previous audio track are correlated to determine an order of audio tracks for playback and/or to determine the duration of the mix transition. | 09-11-2008 |
20080235267 | Method and Apparatus For Automatically Generating a Playlist By Segmental Feature Comparison - A playlist of content items, e.g. songs, is automatically generated in which content items having features similar to features of a seed content item are selected. At least one feature of the seed content item is compared with at least one feature of each candidate content item to identify specific ones of the candidate content items that are similar to the seed content item. The identified candidate content items are then added to the playlist. Multiple features represent (e.g. are extracted from) different parts of a plurality of candidate content items and/or multiple features of the seed content item represent (e.g. are extracted from) different parts of the seed content item. The multiple features of the seed content item and/or of the candidate content items are compared with at least one feature of the seed content item or of the candidate content items. | 09-25-2008 |
20080240435 | Perpetual Masking For Secure Watermark Embedding - Disclosed are a method and a system for secure watermark embedding in a server-client configuration ( | 10-02-2008 |
20080250240 | Remote Informed Watermark Detection System - A system and a method for secure remote informed watermark detection making use of a side-information. The system in overview comprises a remote detector and a server computing system wherein a database with side-information assigned to specific descriptors of data signals is stored at the server computing system and wherein a remote detector intending to identify the watermark of a data signal will derive the descriptor of the data signal and subsequently contact the trusted server computing system in order to obtain the necessary side-information for the informed watermark detection. | 10-09-2008 |
20080253476 | Method and System for Enabling Collusion Resistant Watermarking - A method and a system for modifying a bitstream signal for enabling collusion resistant bitstream watermarking. The method comprises dividing a bitstream spectral signal X[k] of the bitstream signal bx into a first signal ( | 10-16-2008 |
20080273742 | Watermark Embedding - Disclosed are methods and systems for embedding watermarks in information signals to obtain a watermarked information signal. The method of embedding a watermark comprises the steps of determining a predetermined first property of a first part of the information signal, said predetermined first property being indicative of whether at least a predetermined first part of the watermark signal is detectable in the first part of the information signal; embedding the at least first part of the watermark in the first part of the information signal to obtain the watermarked information signal, if the at least first part of the watermark signal is determined not to be detectable in the first part of the information signal; otherwise generating the watermarked information signal to include the first part of the information signal. | 11-06-2008 |
20080275710 | Scale Searching for Watermark Detection - The present invention relates to a method, device ( | 11-06-2008 |
20080276324 | Encoding With Watermarking Prior to Phase Modulation - In watermarking systems, hackers may try to remove the watermark using a so-called collusion attack. If the attacker has access to multiple identical signals with different watermarks (this typically occurs in electronic content delivery systems), simply averaging the signals will remove the watermark energy. A known solution to this problem is phase modulation. By modulating the phase of the signals, the averaging attack will cause phase cancellation to occur and annoying artifacts to be introduced. In the prior art, said phase modulation is carried out in the base-band domain, prior to watermark embedding. The present invention enables phase modification efficiently to be applied to transform coded signals, in particular DCT or MDCT coded signals such as MP3 or AAC audio signals, or MPEG2 video signals. The bitstream is partially decoded ( | 11-06-2008 |
20080301456 | Efficient Secure Forensic Watermarking - The invention relates to a watermark generation method for generating watermarks to be embedded in digital media, where said watermark is generated by combining at least two watermark patterns from a set of watermark patterns. The set of watermark patterns are divided into at least two subsets of watermark patterns, and the subsets are hierarchically related and the watermark patterns in said watermark are directly related watermark patterns. Directly related means that the watermark patterns are related like parent and child in a hierarchical structure e.g. a tree structure. Further, the invention relates to an apparatus adapted to generate watermarks to be embedded in media. | 12-04-2008 |
20080310629 | Multibit Forensic Watermark with Encrypted Detection Key - The invention relates to embedding auxiliary data in the form of a multibit payload in a host signal, and encrypting the associated detection key. Moreover, the invention relates to extracting the auxiliary data in the form of the multibit payload from a data signal. Auxiliary data is embedded in a host signal by the following steps. First a reference watermark is provided, subsequently an encrypted detection key associated only with the reference watermark is generated. The encrypted detection key may be a scrambled version of the watermark. In a further step, the multibit watermark is generated and a multibit payload is encoded into the reference watermark. Finally, the multibit watermark is embedded into the host signal. | 12-18-2008 |
20090013188 | Search for a Watermark in a Data Signal - The invention relates to a method of searching for a watermark in a data signal, and to a watermark detector, such as a copy-control watermark detector. The search is conducted in order to find a watermark in content which possibly has been attacked and/or altered. The search is conducted by the steps of determining or setting a search space for the data signal, selecting a subspace of the search space, and searching for the presence of the watermark in the subspace. The subspace may be selected from a multitude of regions, the selection e.g. being based on a deterministic or probabilistic function. | 01-08-2009 |
20090046819 | METHOD OF REDUCING QUANTIZATION NOISE - There is described a system ( | 02-19-2009 |
20090136026 | WATERMARK EMBEDDING USING LOOK-UP TABLES - The invention relates to embedding a spread spectrum watermark in a data signal as well as to detection of the embedded watermark. A data signal ( | 05-28-2009 |
20090327734 | MATCHING A WATERMARK TO A HOST SAMPLING RATE - The invention deals with matching of a watermark to a host sampling rate of a multimedia signal. A watermark sampled at a first sampling rate is matched to multimedia host signal sampled at a second sampling rate, in a process where the watermark sampled at the first sampling rate is received, a scaling factor between the first sampling rate and the second sampling rate is determined, and re-scale widths of the watermark symbols are set. A modified watermark is generated wherein the watermark symbols of the modified watermark being of re-scale widths, so as to substantially match the modified watermark sequences to the second sampling rate. | 12-31-2009 |
20100058065 | EXTRACTING AUXILIARY DATA FROM A HOST SIGNAL - The invention relates to extracting and embedding auxiliary data from and to a host signal. In an embodiment, the auxiliary data relates to remotely control of an application or a device, such as an interactive toy. Auxiliary data are extracted from a host signal, by periodically ( | 03-04-2010 |
20100082478 | APPARATUS & METHODS FOR DIGITAL CONTENT DISTRIBUTION - The present invention relates to methods and apparatus for digital content distribution. A method of transferring digital content from a first entity ( | 04-01-2010 |
20100177888 | WARERMARKING AND ENCRYPTION OF ENTROPY-CODED DATA USING ADDITIVE HUFFMAN TABLE - A secure forensic watermarking system is disclosed that distributes the same encrypted content to all users. The decryption key is different for each user, so that the decrypted content differs slightly from the original, i.e. is watermarked. Forensic tracking is possible by distributing unique decryption keys to individual users. The invention allows a forensic mark to be securely embedded in the compressed domain signal. In an embodiment of this invention, the content (x) and an encryption sequence (r) are entropy encoded using a homomorphic Huffman table. A homomorphic Huffmann table is a table H having the property that there exists an operation f( ) such that H- | 07-15-2010 |
20100309016 | LIGHTING SYSTEM AND METHOD FOR OPERATING A LIGHTING SYSTEM - A lighting system and a method for a operating a lighting system, enabling to obtain an identification tag ( | 12-09-2010 |
20110271120 | Method and System for Verifying the Identity of an Individual by Employing Biometric Data Features Associated with the Individual - The invention relates to a method for verifying the identity of an individual by employing biometric data features associated with the individual, which method provides privacy of said biometric data features, comprising at least the steps of: a) for enrolment purposes deriving a first biometric template from at least a first set of first biometric data features associated with said individual, and b) for identity verifying purposes deriving a further biometric template from at least a further set of said first biometric data features associated with said individual, and c) comparing said further biometric template with said first biometric template. The invention also relates to a system for verifying the identity of an individual by employing biometric data features associated with the individual, which system at least comprises: an enrolment means and a verifying means, wherein said enrolment means are arranged in deriving a first biometric template data, said first biometric template data being secret and associated with a first set of first biometric data features of said individual, and in receiving a further set of first biometric data features of said individual, and in deriving a further biometric template data associated with said further set of first biometric data, and wherein said verifying means are arranged in comparing the first biometric template data with the further biometric template data to check for correspondence, wherein the identity of the individual is verified if correspondence exists. | 11-03-2011 |
20120087550 | ROBUST BIOMETRIC FEATURE EXTRACTION WITH AND WITHOUT REFERENCE POINT - A basic idea of the present invention is to selectively employ one of at least two different feature extraction processes when generating a biometric template of an individual. An individual offers a physiological property, such as a fingerprint, an iris, an ear, a face, etc., from which biometric data can be derived, to a sensor of an enrolment authority. In the following, the property to be discussed will be fingerprints, even though any suitable biometric property may be used. From the fingerprint, a positional reference point of the biometric data is derived. The derivation of the positional reference point may be accomplished using any appropriate method out of a number of known methods. Such a reference point could be the location of a core, a delta, a weighted average of minutiae coordinates, or alike. Typically, the reference point includes a core of a fingerprint expressed as a three-dimensional coordinate denoted by means of x | 04-12-2012 |
20120308093 | Method and System for Generating a Representation of a Finger Print Minutiae Information - The invention relates to a method for generating a representation of a finger print minutiae information. The invention also relates to a method for generating a representation of a finger print for biometric template protection purposes Biometric template protection techniques provide technological means to protect the privacy of biometric reference information stored in biometric. systems These methods stand in sharp contrast to approaches where biometric information is protected only by legislation and procedures around storage facilities. These systems are not reliable as they are susceptible to human and procedural errors. Template protection guarantees the protection of biometric information without the assumption that individuals are trusted or procedures are properly implemented. | 12-06-2012 |
20130036309 | SYSTEM AND METHOD FOR VERIFYING THE IDENTITY OF AN INDIVIDUAL BY EMPLOYING BIOMETRIC DATA FEATURES ASSOCIATED WITH THE INDIVIDUAL - The invention relates to a system for verifying the identity of an individual by employing biometric data features associated with the individual, which system comprises at least one or more hardware components, an enrolment means, and a verifying means, wherein said enrolment means are arranged in deriving a first biometric template data, said first biometric template data being secret and associated with a first set of first biometric data features of said individual, and in receiving a further set of first biometric data features of said individual, and in deriving a further biometric template data associated with said further set of first biometric data, and wherein said verifying means are arranged in comparing the first biometric template data with the further biometric template data to check for correspondence, wherein the identity of the individual is verified if correspondence exists. The invention aims to provide a solution to the above identified drawbacks and thereto at least one of said hardware components is provided with at least one component specific data feature associated therewith and wherein said enrolment means are arranged in associating at least one of said component specific data features with said biometric template data. | 02-07-2013 |