On Thursdays the USPTO publishes new patent applications.Both of today's Spotlight Applications address aspects of digital watermarking and both are assigned to Thomson. The first application discloses techniques for watermarking an audio or video signal with watermark data using a spread spectrum. The second application discloses copy protection techniques for digital data stored on a medium.
Abstract
Watermark information (denoted WM) consists of several symbols which are embedded continuously in an audio or a video signal using spread-spectrum. At decoder site the WM is regained using correlation of the received signal with an resequence. According to the invention, not only is the watermark made audio or video signal level dependent (PAS), but also the spreading sequence used for the watermark is made audio or video signal level dependent. This means that the same WM symbol is encoded by several different spreading sequences (NSS). The encoder tests (DEC), which one of these WM symbols or sequences can be retrieved best in a decoder, and embeds that selected spreading sequence WM in the audio or video signal to be watermarked. At decoder side all candidate WM spreading sequences are correlated with the received signal and the spreading sequence with the best match is chosen as the correct one.
20090232303, "Copy Protection Method for Digital Data Stored on a Medium," assigned to Thomson.
Abstract
A method of protection against the copying of digital data stored on an information carrier envisages, on the basis of a first identification of an encryption of the digital data and of a second identification of a watermarking of digital data, the determination of a first mark if it has been possible to identify the encryption and the watermarking. A third identification of a type of the information carrier is followed by the determination of a second mark if it has been possible to determine the first mark and if has been possible to identify a determined type of information carrier. A fourth identification of cryptographic signature data accompanying the digital data is followed by the determination of a third mark if it has been possible to determine the second mark and if it has been possible to identify a cryptographic signature datum. A permission for digital copying of the digital data is delivered if it has been possible to determine the third mark