Encoding and Decoding Signals for Digital Watermarking

ABSTRACT

This disclosure describes methods and systems for encoding a digital watermark into and/or detecting a digital watermark from a host (or media) signal such as audio, video or imagery. One implementation involves a method of detecting a digital watermark. The method includes: receiving a host signal carrying a digital watermark; computing attributes of the host signal; using the attributes of the host signal to compute a key; and using the key to detect the digital watermark in a transform domain dependent on the key. Other methods, systems and apparatus are provided as well.

TECHNICAL FIELD

The present application is a continuation of application Ser. No. 10/132,060, filed Apr. 24, 2002 (now U.S. Pat. No. 7,046,819) which claims benefit of provisional application No. 60/286,701, filed Apr. 25, 2001, which are each hereby incorporated by reference.

BACKGROUND

Digital watermarking is a process for modifying physical or electronic media to embed a machine-readable code into the media. The media may be modified such that the embedded code is imperceptible or nearly imperceptible to the user, yet may be detected through an automated detection process. Most commonly, digital watermarking is applied to media signals such as images, audio signals, and video signals. However, it may also be applied to other types of media objects, including documents (e.g., through line, word or character shifting), software, multi-dimensional graphics models, and surface textures of objects.

Digital watermarking systems typically have two primary components: an encoder that embeds the watermark in a host media signal, and a decoder that detects and reads the embedded watermark from a signal suspected of containing a watermark (a suspect signal). The encoder embeds a watermark by altering the host media signal. The reading component analyzes a suspect signal to detect whether a watermark is present. In applications where the watermark encodes information, the reader extracts this information from the detected watermark.

Several particular watermarking techniques have been developed. The reader is presumed to be familiar with the literature in this field. Particular techniques for embedding and detecting imperceptible watermarks in media signals are detailed in the assignee's co-pending application Ser. Nos. 09/503,881 (now U.S. Pat. No. 6,614,914), 60/278,049 and U.S. Pat. No. 6,122,403, which are hereby incorporated by reference.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a diagram illustrating a digital watermark embedder.

FIG. 2 is a diagram illustrating a digital watermark detector compatible with the embedder of FIG. 1.

DETAILED DESCRIPTION

This disclosure describes a method for encoding a digital watermark into an image signal that is robust to geometric distortion. The digital watermark is adapted to the host image signal in which it is embedded so as to be imperceptible or substantially imperceptible in the watermarked image when displayed or printed. This digital watermark may be used to determine the geometric distortion applied to a watermarked image, may be used to carry auxiliary information, and may be used to detect and decode a digital watermark embedded in a geometrically distorted version of a watermarked image. Because of its robustness to geometric distortion, the digital watermark is useful for a number of applications for embedding auxiliary data in image signals, including still pictures and video, where the image signal is expected to survive geometric distortion.

This method may be adapted to other types of media signals such as audio.

The digital watermarking system includes an embedder and a detector. The embedder embeds the digital watermark into a host media signal so that it is substantially imperceptible. The detector reads the watermark from a watermarked signal.

FIG. 1 is a diagram illustrating a digital watermark embedder.

The embedder encodes a reference signal into a particular transform domain of the host media signal, called the encoded domain. The embedding of the reference signal may use a secret key. Also, the encoded reference signal can be embedded so that it is dependent on the host signal by using some attributes of the host signal to create the encoded reference signal. For example, a hash of attributes of the host media signal may be used as a key to encode the reference signal in the encoded domain. The hash is preferably robust to manipulation of the host signal, including changes due to embedding the digital watermark, so that it can be derived from the watermarked signal and used to decode the embedded watermark. Examples of hashes include most significant bits of image samples, low frequency components (e.g., low frequency coefficients, a low pass filtered, sub sampled and/or compressed version of the host signal or signal attributes).

The following describes a digital watermark embedder and detector for images. First, the embedder creates the reference signal in the encoded domain. The encoded domain is a transform domain of the host image. In this particular example, the relationship between the spatial domain of the host image and the encoded domain is as follows. To get from the image to the encoded domain, the image is transformed to a first domain, and then the first domain data is transformed into the encoded domain.

The embedder starts with a reference signal with coefficients of a desired magnitude in the encoded domain. These coefficients initially have zero phase. Next, the embedder transforms the signal from the encoded domain to the first transform domain to recreate the magnitudes in the first transform domain.

The selected coefficients may act as carriers of a multi-bit message. For example, in one implementation, the multi-bit message is selected from a symbol alphabet comprised of a fixed number of coefficients (e.g., 64) in the encoded domain. The embedder takes a desired message, performs error correction coding, and optional spreading over a PN sequence to produce a spread binary signal, where each element maps to 1 of the 64 coefficients. The spreading may include taking the XOR of the error correction encoded message with a PN sequence such that the resulting spread signal has roughly the same elements of value 1 as those having a value of 0. If an element in the spread signal is a binary 1, the embedder creates a peak at the corresponding coefficient location in the encoded domain. Otherwise, the embedder makes no peak at the corresponding coefficient location. Some of the coefficients may always be set to a binary 1 to assist in detecting the reference signal.

Next, the embedder assigns a pseudorandom phase to the magnitudes of the coefficients of the reference signal in the first transform domain. The phase of each coefficient can be generated by using a key number as a seed to a pseudorandom number generator, which in turn produces a phase value. Alternatively, the pseudorandom phase values may be computed by modulating a PN sequence with an N-bit binary message.

Now, the embedder has defined the magnitude and phase of the reference signal in the first transform domain. It then transforms the reference signal from the first domain to the perceptual domain, which for images, is the spatial domain. Finally, the embedder adds the reference signal to the host image. Preferably, the embedder applies a gain factor to the reference signal that scales the reference signal to take advantage of data hiding characteristics of the host image. For examples of such gain calculations see the patent documents incorporated by reference above.

In one implementation, the first transform domain is a 2D Fourier domain computed by taking an FFT of a block of the host image. The encoded domain is computed by performing a 2D transform of the first transform domain. To create the reference signal, the magnitude of the coefficients of the encoded domain are set to desired levels. These coefficients have zero phase. This signal is then re-created in the first domain by taking the inverse FFT of the reference signal in the encoded domain. Next, the embedder sets the phase of the signal in the first domain by generating a PN sequence and mapping elements of the PN sequence to coefficient locations in the first domain. Finally, the embedder computes the inverse FFT of the signal, including its magnitude components and phase components, to get the spatial domain version of the reference signal. This spatial domain signal is scaled and then added to the host signal in the spatial domain. This process is repeated for contiguous blocks in the host image signal, such that the embedded signal is replicated across the image.

The host image and reference signal may be added in the first transform domain and then inversely transformed using in inverse FFT to the spatial domain.

The embedder may use a key to specify the magnitudes of the coefficients in the encoded domain and to generate the random phase information of the reference signal in the first transform domain. The locations and values of the coefficients of the reference signal in the encoded domain may be derived from the host image, such as by taking a hash of the host image. Also, a hash of the host image may be used to compute a key number for a pseudorandom number generator that generates the pseudorandom phase of the reference signal in the first transform domain.

The above embedding technique may be combined with other digital watermarking methods to encode auxiliary data. In this case, the reference signal is used to correct for geometric distortion. Once the geometric distortion is compensated for using the reference signal, then a message decoding technique compatible with the encoder extracts the message data. This auxiliary data may be hidden using the techniques described in the patent documents reference above or other known techniques described in digital watermarking literature.

FIG. 2 is a diagram illustrating a digital watermark detector compatible with the embedder of FIG. 1.

The detector operates on portions of a signal suspected of containing a digital watermark that has been embedded as described above. First, it creates a specification of the magnitudes of the reference signal in the encoded domain. If the magnitudes were specified by a key, the detector first reads the key or derives it from the watermarked signal. It then constructs a copy of the magnitudes of the reference signal in the encoded domain and uses it to align the watermarked image. If the magnitudes were specified by encoding an N bit message in selected ones of the 64 coefficients, then a proxy for the reference signal is created as a series of peaks at all 64 locations.

To align the watermarked image, the detector transforms the image into the first transform domain and sets the phase to zero. It then transforms the magnitudes of the watermarked image in the first domain into the encoded domain. In the encoded domain, the detector correlates the copy of the reference signal constructed from the key or N bit message with the magnitude data of the watermarked image transformed from the first domain.

The detector may use any of a variety of correlation techniques, such as matched filtering or impulse filtering, to determine affined transformation parameters (e.g., rotation, scale, differential scale, shear), except translation, based on the magnitude data in the encoded domain. Examples of some correlation techniques are provided in the patent documents referenced above. One technique is to transform the magnitude information of the reference signal and watermarked image data to a log polar space using a Fourier Mellin transform and use a generalized match filter to determine the location of the correlation peak. This peak location provides an estimate of rotation and scale.

After finding the rotation and scale, the detector aligns the watermarked image data and then correlates the phase of the aligned watermarked image with the phase of the reference signal. The detector may correlate the watermarked image data with the pseudorandom carrier signal used to create the random phase, or the random phase specification itself. In the case where the pseudorandom phase of the reference signal is created by modulating a message with a pseudorandom carrier, a part of the message may remain constant for all message payloads so that the constant part can be used to provide accurate translation parameters by phase matching the reference phase with the phase of the aligned watermarked image.

Once the watermarked image is aligned using the above techniques, message data may be decoded from the watermarked image using a message decoding scheme compatible with the embedder. In the particular case where an N bit message is encoded into the magnitude of the reference signal in the encoded domain, the message decoder analyzes the 64 coefficient locations of the watermarked data in the encoded domain and assigns them to a binary value of 1 or 0 depending on whether a peak is detected at the corresponding locations. Then, the decoder performs spread spectrum demodulation and error correction decoding (e.g., using a technique compatible with the embedder such as BCH, convolution, or turbo coding) to recover the original N bit binary message.

In the particular case where the N bit message is encoded into the pseudorandom phase information of the reference signal, the decoder correlates the phase information of the watermarked signal with the PN carrier signal to get estimates of the error correction encoded bit values. It then performs error correction decoding to recover the N bit message payload.

The same technique may be adapted for audio signals, where the first domain is a time frequency spectrogram of the audio signal, and the encoded domain is an invertible transform domain (e.g., 2D FFT of the spectrogram).

Concluding Remarks

Having described and illustrated the principles of the technology with reference to specific implementations, it will be recognized that the technology can be implemented in many other, different, forms. To provide a comprehensive disclosure without unduly lengthening the specification, applicants incorporate by reference the patents and patent applications referenced above.

The methods, processes, and systems described above may be implemented in hardware, software or a combination of hardware and software. For example, the auxiliary data encoding processes may be implemented in a programmable computer or a special purpose digital circuit. Similarly, auxiliary data decoding may be implemented in software, firmware, hardware, or combinations of software, firmware and hardware. The methods and processes described above may be implemented in programs executed from a system's memory (a computer readable medium, such as an electronic, optical or magnetic storage device).

The particular combinations of elements and features in the above-detailed embodiments are exemplary only; the interchanging and substitution of these teachings with other teachings in this and the incorporated-by-reference patents/applications are also contemplated. 

1. A method comprising: obtaining a media signal; computing a reduced-bit representation of the media signal; influencing a digital watermark embedding process with the reduced-bit representation of the media signal; and embedding a digital watermark in the media signal with the influenced digital watermark embedding process.
 2. The method of claim 1 wherein the media signal represents at least one of audio, video or imagery.
 3. The method of claim 1 wherein the watermark embedding process embeds at least a reference signal in the media signal that is used to correct for geometric distortion.
 4. The method of claim 3 wherein the reduced-bit representation is used to generate the reference signal.
 5. The method of claim 4 wherein the reduced-bit number seeds a pseudorandom number generator used to generate the reference signal.
 6. The method of claim 1 wherein the watermark embedding process embeds at least one digital watermark component in a transform domain that is dependent on the reduced-bit representation.
 7. The method of claim 1 wherein the reduced-bit representation is used to generate a watermark embedding key associated with a transform domain.
 8. The method of claim 1 wherein the reduced-bit representation comprises a hash derived from the media signal.
 9. A method comprising: receiving a media signal comprising a digital watermark hidden therein; computing a reduced-bit representation of the media signal; influencing detection of a digital watermark detector with the reduced-bit representation of the media signal; and analyzing the media signal to detect the digital watermark hidden therein with the influenced digital watermark detector.
 10. The method of claim 9 wherein the digital watermark comprises a reference signal, and wherein the reduced-bit representation is associated with detecting the reference signal.
 11. The method of claim 10 wherein the reference signal is used to correct for geometric distortion.
 12. The method of claim 9 wherein the digital watermark comprises at least one component that is detectable in a transform domain, and wherein the transform domain is associated with the reduced-bit representation.
 13. The method of claim 9 wherein the reduced-bit representation is used to calculate a detection key used by the digital watermark detector to detect the digital watermark.
 14. The method of claim 9 wherein the reduced-bit representation seeds a pseudorandom number generator used at least in part in detecting the digital watermark.
 15. The method of claim 9 wherein the reduced-bit representation comprises a hash derived from the media signal.
 16. The method of claim 9 wherein the act of directing detection of a digital watermark detector with the reduced-bit representation of the media signal comprises at least an act of utilizing a transform domain that is associated with the reduced-bit representation of the media signal.
 17. A method of detecting a digital watermark comprising: receiving a host signal carrying a digital watermark; computing attributes of the host signal; using the attributes of the host signal to compute a key; and using the key to detect the digital watermark in a transform domain dependent on the key.
 18. The method of claim 17 wherein the host signal comprises at least one of audio, video or imagery.
 19. The method of claim 17 wherein the digital watermark comprises at least a reference signal that is used to correct for geometric distortion.
 20. The method of claim 17 wherein the attributes seed a pseudo-random number generator used to compute the key. 