Language selection

Search

Patent 2304041 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent: (11) CA 2304041
(54) English Title: METHOD FOR IMAGE PROCESSING TO FACILITATE COPY PROTECTION
(54) French Title: PROCEDE DE TRAITEMENT D'IMAGE FACILITANT LA PROTECTION CONTRE LA COPIE
Status: Expired
Bibliographic Data
(51) International Patent Classification (IPC):
  • H04L 9/32 (2006.01)
  • G06T 1/00 (2006.01)
(72) Inventors :
  • LEIGHTON, F. THOMSON (United States of America)
(73) Owners :
  • LEIGHTON, F. THOMSON (United States of America)
(71) Applicants :
  • LEIGHTON, F. THOMSON (United States of America)
(74) Agent: KIRBY EADES GALE BAKER
(74) Associate agent:
(45) Issued: 2004-06-01
(86) PCT Filing Date: 1999-07-19
(87) Open to Public Inspection: 2000-01-27
Examination requested: 2000-03-15
Availability of licence: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): Yes
(86) PCT Filing Number: PCT/US1999/016515
(87) International Publication Number: WO2000/004422
(85) National Entry: 2000-03-15

(30) Application Priority Data:
Application No. Country/Territory Date
09/120,023 United States of America 1998-07-17

Abstracts

English Abstract




A method for mapping a work (e.g., a picture, a document or the like)
comprising a
large number of bytes into a relatively small bit string to facilitate copy
protection. The
technique creates a first string from the work with the property that if one
modifies the work by
some given degree (e.g., through intentional variation or perhaps merely
through aging), a
second string (generated by the inventive technique) and associated with the
modified work is
not meaningfully distinct from the first string. When applied through the
algorithm, works that
are similar result in the same or similar strings. As a result, an owner of
the content sought to
be protected may apply the algorithm to copies of the work for copy protection
purposes.


French Abstract

Procédé permettant d'effectuer le mappage d'une oeuvre (graphique, document, etc.) constituée d'un grand nombre d'octets de façon à obtenir une chaîne binaire relativement petite afin de faciliter la protection contre la copie. La technique consiste à créer, à partir de l'oeuvre, une première chaîne caractérisée par le fait que si quelqu'un modifie ladite oeuvre à un certain degré (modification intentionnelle ou simple vieillissement), une seconde chaîne (générée par la technique de l'invention) associée à l'oeuvre modifiée n'est pas sensiblement distincte de la première chaîne. Une fois que l'algorithme leur a été appliqué, des oeuvres similaires donnent des chaînes identiques ou similaires. Le propriétaire du contenu à protéger peut donc appliquer cet algorithme aux copies de l'oeuvre à des fins de protection contre la copie.

Claims

Note: Claims are shown in the official language in which they were submitted.




6

CLAIMS

1. A method for mapping a document comprising a large number of bytes into a
bit string b_1, ..., b_m to facilitate copy protection of the document,
comprising the steps of:
generating m x n N(0,1 ) random variables Z_(1,1), ..., Z_(m,n) and storing
the random
variables in an m x n matrix Z*;
processing the document into a digital string y_1, ..., y_n;
normalizing the y_i values to generate a vector y*;
computing a matrix-vector product v* = Z*xy*, where v_1, ..., v_m denote the
values
of v*;
selecting first and second thresholds t' and t" where t' is selected so that
the probability
that y_1 x u_1 + ... + y_m x u_m < t' is close to about 1/4 when each u_i is
an independent
N(0,1) random variable, and where t" is selected so that the probability that
y_1 x u_1 + ... +
y_m x a_m > t" is close to about 1/4; and
determining if v_i < t' or if v_i > t" for each v_i from v_1 to v_m; and
if v_i is less than t' or if v_i is greater than t", then set b_i = 0;
if v_i is not less than t' or if v_i is not greater than t", set b_i = 1;
wherein the value of i in b_i corresponds to the value of i in v_i.

Description

Note: Descriptions are shown in the official language in which they were submitted.


CA 02304041 2000-03-15
WO 00/04422 PGT/US99/16515
METHOD FOR IMAGE PROCESSING TO FACILITATE COPY PROTECTION
BACKGROUND OF THE INVENTION
Technical Field
The present invention relates generally to securing content against wrongful
duplication
and, more particularly, techniques for processing an image into a digital
string so that images
with similar features (e.g., illicit or cropped copies) get mapped into a
digital string that is close
to the original string.
Description of the Related Art
The proliferation of digitized media and the ease with which digital files can
be copied
especially over public computer networks (e.g., the Internet) has created a
need for copy and
copyright enforcement schemes. Conventional cryptographic systems permit only
valid
keyholders access to encrypted data, but once such data is decrypted there is
no way to track its
reproduction or retransmission. Such schemes thus provide insufficient
protection against
unauthorized reproduction of information. It is known in the prior art to
provide a so-called
digital "watermark" on a document to address this problem. A "watermark" is a
visible or
preferably invisible identification code that is permanently embedded in the
data and thus
remains present within the data after any decryption process. One example of a
digital
watermark would be a visible "seal" placed over an image to identify the
copyright owner.
However, the watermark might also contain additional information, including
the identity of the
purchaser of a particular copy of the material.
Many schemes have been proposed for watermarking digital data. In a known
watermarking procedure, each copy of a document D is varied slightly so as to
look the same to
the user but also so as to include the identity of the purchaser. The
watermark consists of the
variations that are unique to each copy. The idea behind such schemes is that
the watermark
should be hard to remove without destroying the document. Thus, a copy of a
watermarked
document should be traceable back to the specific version of the original from
which it was
created. Although certain watermarking techniques provide advantages, there
remains a need for
a more general approach to the problems associated with content protection.
SUMMARY OF THE INVENTION
It is a primary object of the present invention to provide an improved method
for securing
content against wrongful duplication.
SUBST1TUZ'E SHEET (RULE 26)

CA 02304041 2003-07-30
2
It is still another object of this invention to provide improved methods for
processing
an image (or other work) into a digital string so that images with similar
features (e.g., illicit or
cropped copies) get mapped into a digital string that is close to the original
digital string.
It is another more general object of this invention to protect against the
wrongful
proliferation of digitized media over public computer networks (e.g., the
Internet).
A still further object of this invention is to provide for more efficient and
reliable copy
and copyright enforcement schemes.
In accordance with one aspect of the present invention there is provided a
method for
mapping a document comprising a large number of bytes into a bit string b_1,
..., b m to
facilitate copy protection of the document, comprising the steps of:
generating m x n N(0,1)
random variables Z_(1,1), ..., Z_(m,n) and storing the random variables in an
m x n matrix Z*;
processing the document into a digital string y_1, ..., y_n; normalizing the y
i values to
generate a vector y*; computing a matrix-vector product v* = Z*xy*, where v_1,
..., v m
denote the values of v*; selecting first and second thresholds t' and t" where
t' is selected so
that the probability that y_1 x u_1 + ... + y m x a m < t' is close to
about'/a when each a i is
an independent N(0,1 ) random variable, and where t" is selected so that the
probability that
y_1 x u_1 + ... + y m x a m > t" is close to about'/e; and determining if v i
< t' or if v i > t"
for each v i from v_1 to v m; and if v_i is less than t' or if v i is greater
than t", then set
b i = 0; if v i is not less than t' or if v i is not greater than t", set b i
= l; wherein the value of
i in b i corresponds to the value of i in v_i.
The above as well as additional objects, features, and advantages of the
present
invention will become apparent in the following detailed written description.
BRIEF DESCRIPTION OF THE DRAWING
The novel features believed characteristic of the invention are set forth in
the appended
claims. The invention itself however, as well as a preferred mode of use,
further objects and
advantages thereof, are best understood by reference to the following Detailed
Description of
an illustrative embodiment when read in conjunction with the accompanying
Drawing, therein:
Figure 1 is a flowchart of the inventive method.

CA 02304041 2003-07-30
2a
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
The present invention is preferably implemented in software (e.g., a series of
program
instructions) executed in a computer. It is assumed that the content to be
protected is a picture
or other image. The invention may be applied to any content (including,
without limitation,
video, graphics, sound, text, etc.) irrespective of its form, however. For
purposes of illustration,
the invention will be described in the context of a picture. The picture is
digitized in any
convenient manner.
According to the invention, once digitized, the picture is run through a
hashing
algorithm and reduced to approximately thirty (30) bits so that most any other
picture that was a
small modification of the original gets mapped to the same string (with maybe
a couple of bits
different). This is useful in watermarking since this string, then, could be
used as part of x 1,
.. ., x n when one uses H(x-1 ... x n~Do not copy) as an offset watermark.
When this approach
is followed, the watermark used for different pictures is different (which
makes it harder for the
adversary to remove), but it is still possible for someone who knows H to
regenerate the
watermark. In particular, the watermark used for different pictures is
different (which makes it
harder for the adversary to remove) but it is still possible for someone who
knows H to
regenerate the watermark for a correlation test (without access to a
database), since even if the

CA 02304041 2000-03-15
WO 00/04422 PCT/US99/16515
3
adversary changes the picture a little, he cannot change the string x_1, ...,
x n very much; so, it is
possible to later regenerate the original x I, ..., x n by computing the
derived values from the
picture and trying all possibilities that are within a few bits.
Such a mapping function is also useful in Web search engines. For example,
assume one
wants to search for copies of a document/picture on the Web even if such
copies are changed a
little bit. One could use the present invention and compute the string for
every candidate picture
on the Web and see which ones were close to the string for the original. From
this information,
one could check the candidates that match by eye, thereby cutting the search
space by a huge
factor.
There may also be applications in the domain of organizing pictorial data into
similarity
classes, which could be done according to the digital string produced by the
following algorithm.
Implementation
With reference now to the flowchart of Figure 1, the inventive mapping scheme
has a
number of steps.
Step 1: generate m x n N(0,1 ) random variables Z_( I,1 ), ..., Z (m,n). Store
these values
in an m x n matrix Z*. These values will be used for all documents and will be
kept secret.
This may be done in an off line process.
Step 2: convert the document into a digital string y I, ..., y n using any
standard method.
If possible, normalize the y_i values so that over the universe of all
documents, y i can be
thought of as a N(0,1 ) random variable. (The latter step is not required, but
it makes the process
work better.) Treat the n values as a vector y*.
Step 3: compute the matrix-vector product v* = Z*xy*. Let v I, ..., v m denote
the
values of v*. Note that each v i can be thought of as a normal random
variable, no matter what
the y values are. For example, the mean of each v i is M = (y 1 + ... + y
m)/m.
Step 4: compute two thresholds t' and t" as follows. Select t' so that the
probability that
y I x a 1 + ... + y m x a m <t' is close to about 1 /4 when each a i is an
independent N(0,1 )
random variable. Select t" so that the probability that y 1 x a 1 + ... + y m
x a m > t" is close
to about 1/4. There are many possible variations of this step, e.g., one with
just one threshold at
the value t =M, or by adjusting the two threshold values.
Step 5: For each of i, if v i <t' or if v i >t", then set b i = 0. Otherwise,
set b i = 1.
(Note that each b i will be equally likely to be 0 or l.) The values b_1, ...,
b m form the desired
bit string for the document.
SUBSZ1TIJTE SHEET (RULE 26)

CA 02304041 2003-07-30
4
The mapping function reduces the content (to be protected) from a large number
of
bytes to a string having a small number of bits. Changing just a few values of
y* (or all of the
values of y* by a little bit), however, does not have a meaningful effect on
the values of b* that
are computed. For example, in order to change the value of brj, the adversary
must change
enough of the y_i's by enough so that the corresponding vrj is pushed across a
threshold.
Without knowing the Z* values, this is hard for the adversary to do if he is
restricted to making
small changes in the y_i's (since most of the vrj's are not likely to be very
near a threshold in
the first place). In fact, it is well supported in the art that the amount by
which the adversary is
required to change the y i's to effect a significant change in the b_j's is
the maximum possible
for any scheme.
Thus, the mapping function (when applied to copies of the document) is quite
useful for
copy protection purposes. Generalizing, the technique described above creates
a first string
from a picture (or other work) with the property that if one modifies the
picture by some given
degree (e.g., through intentional variation or perhaps merely through aging),
a second string
I S (generated by the inventive technique) and associated with the modified
picture is not
meaningfully distinct from the first string. The invention can be used to
reduce a picture
(or other work) comprising a large number of bytes into a string having a
small number of bits,
and thus pictures that are similar result in the same or similar strings. As a
result, an owner of
the content sought to be protected may apply the algorithm to copies of the
work for copy
protection purposes.
As described above, aspects of the present invention pertain to specific
"method steps"
implementable on one or more computers. In an alternate embodiment, the
invention may be
implemented as a computer program product for use with a computer system.
Those skilled in
the art should readily appreciate that programs defining the functions of the
present invention
can be delivered to a computer in many forms, which include, but are not
limited to: (a)
information permanently stored on non-writable storage media (e.g. read only
memory devices
with a computer such as ROM or optical disks readable by CD-ROM drive); (b)
information
alterably stored or writable storage media (e.g., floppy disks within a
diskette drive or a hard
disk drive); or (c) information conveyed to a computer through communication
media, such as
through a computer or telephone or other network. It should be understood,
therefore, that such
media, when carrying computer readable instructions that direct the method
functions of the
present invention, represent alternate embodiments of the present invention.

CA 02304041 2000-03-15
WO 00/04422 PCT/US99/16515
In addition, although the various methods described are conveniently
implemented in a
general purpose computer selectively activated or reconfigured by software,
one of ordinary skill
in the art would also recognize that such methods may be carned out in
hardware, in fnmware,
or in more specialized apparatus (e.g., a secure chip) constructed to perform
the required method
steps.
While the invention has been particularly shown and described with reference
to a
preferred embodiment, it will be understood by those skilled in the art that
various changes in
form and detail may be made therein without departing from the spirit and
scope of the
invention.
SUBSTITUTE SHEET (RULE 26)

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Administrative Status , Maintenance Fee  and Payment History  should be consulted.

Administrative Status

Title Date
Forecasted Issue Date 2004-06-01
(86) PCT Filing Date 1999-07-19
(87) PCT Publication Date 2000-01-27
(85) National Entry 2000-03-15
Examination Requested 2000-03-15
(45) Issued 2004-06-01
Expired 2019-07-19

Abandonment History

There is no abandonment history.

Payment History

Fee Type Anniversary Year Due Date Amount Paid Paid Date
Request for Examination $200.00 2000-03-15
Application Fee $150.00 2000-03-15
Maintenance Fee - Application - New Act 2 2001-07-19 $50.00 2001-07-12
Maintenance Fee - Application - New Act 3 2002-07-19 $50.00 2002-07-16
Extension of Time $200.00 2003-05-05
Maintenance Fee - Application - New Act 4 2003-07-21 $50.00 2003-07-21
Final Fee $150.00 2004-03-08
Maintenance Fee - Patent - New Act 5 2004-07-19 $200.00 2004-07-19
Maintenance Fee - Patent - New Act 6 2005-07-19 $200.00 2005-05-13
Maintenance Fee - Patent - New Act 7 2006-07-19 $200.00 2006-07-17
Maintenance Fee - Patent - New Act 8 2007-07-19 $200.00 2007-04-17
Maintenance Fee - Patent - New Act 9 2008-07-21 $200.00 2008-07-02
Maintenance Fee - Patent - New Act 10 2009-07-20 $450.00 2010-07-19
Maintenance Fee - Patent - New Act 11 2010-07-19 $250.00 2010-07-19
Maintenance Fee - Patent - New Act 12 2011-07-19 $250.00 2011-07-15
Maintenance Fee - Patent - New Act 13 2012-07-19 $250.00 2012-06-21
Maintenance Fee - Patent - New Act 14 2013-07-19 $250.00 2013-07-15
Maintenance Fee - Patent - New Act 15 2014-07-21 $450.00 2014-03-26
Maintenance Fee - Patent - New Act 16 2015-07-20 $450.00 2015-03-30
Maintenance Fee - Patent - New Act 17 2016-07-19 $450.00 2016-07-18
Maintenance Fee - Patent - New Act 18 2017-07-19 $650.00 2018-06-07
Maintenance Fee - Patent - New Act 19 2018-07-19 $450.00 2018-06-07
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
LEIGHTON, F. THOMSON
Past Owners on Record
None
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Representative Drawing 2000-06-13 1 8
Claims 2003-07-30 1 24
Abstract 2003-07-30 1 20
Description 2003-07-30 6 287
Representative Drawing 2003-09-04 1 7
Cover Page 2000-06-13 2 58
Abstract 2000-03-15 1 48
Description 2000-03-15 5 269
Claims 2000-03-15 1 26
Drawings 2000-03-15 1 14
Cover Page 2004-04-29 1 41
Assignment 2000-03-15 4 117
PCT 2000-03-15 2 97
Prosecution-Amendment 2003-02-04 2 61
Correspondence 2003-05-05 1 28
Correspondence 2003-05-27 1 14
Fees 2003-07-21 1 35
Prosecution-Amendment 2003-07-30 10 381
Correspondence 2004-03-08 1 30
Correspondence 2004-07-19 1 27
Fees 2010-07-19 1 34
Maintenance Fee Payment 2018-06-07 1 33