scispace - formally typeset
Search or ask a question
Author

Arianne M. Lewis

Bio: Arianne M. Lewis is an academic researcher from Verizon Communications. The author has contributed to research in topics: Error detection and correction & Digital watermarking. The author has an hindex of 6, co-authored 7 publications receiving 111 citations.

Papers
More filters
Patent
02 Dec 1999
TL;DR: In this article, a message authentication code is generated from the images of a received video stream, and if desired, compared with a digital watermark embedded in the video stream in order to confirm the accuracy of the video content or identify the source of a video stream.
Abstract: According to the principles of the invention, there is provided a system for generating a message authentication code for a conventional digital video stream. The system operates on the rows and columns of block data for a video stream, and more specifically on histograms of DC coefficients from each row and column, to produce a compact code that is nonetheless descriptive of the underlying images in the video stream. The message authentication code can be reproduced from the images of a received video stream, and if desired, compared with a digital watermark embedded in the video stream in order to confirm the accuracy of the video content or identify the source of the video stream.

37 citations

Patent
30 Jul 2001
TL;DR: In this paper, a system for watermarking digital data includes a watermark etching subsystem (100) and a water-mark extraction subsystem (110) for extracting watermark bits from each window of data values using a specified parameter.
Abstract: A system (100) for watermarking digital data includes a watermark etching subsystem (105) and a watermark extraction subsystem (110). The watermark etching subsystem (105) obtains a matrix of digital data values, selects windows including a plurality of data values from the matrix, specifies a parameter that indicates an acceptable amount of variation in the data values, and etches watermark bits in each window of data values using the specified parameter. The watermark extraction subsystem (110) obtains a matrix of digital data values containing an etched watermark, selects windows comprising a plurality of data values from the matrix, and extracts watermark bits from each window of data values using the specified parameter.

34 citations

Patent
19 Jun 2000
TL;DR: In this article, the authors proposed a method of generating authentication codes with improved error tolerance, which exhibits improved survivability against acceptable signal distortions such as recompression, where the original values of DC coefficients from each block of the image coefficient data are mapped to a modified value contained in one of the first and second regions, but not contained in the error tolerance buffer region.
Abstract: A method of generating a authentication code (“MAC”) with improved error tolerance exhibits improved survivability against acceptable signal distortions such as recompression. A method of generating a message authentication code associated with an image includes receiving blocks of image coefficient data where each coefficient has an original value falling within a range of values. The range of values is divided into first and second regions both having allowed coefficient values, and an error tolerance buffer region formed between the first and second regions having disallowed coefficient values. The original values of DC coefficients from each block of the image coefficient data is mapped to a modified value contained in one of the first and second regions, but not contained in the error tolerance buffer region. A MAC is generated as a function of the most significant bits of the modified image coefficient values.

14 citations

Patent
17 Mar 2000
TL;DR: In this article, the authors proposed a system and method for reliably transmitting Internet Protocol (IP) data packets over fading Internet communication channels, which consists of a transmitting device 12 having an interleaver circuit 22 and a receiving device 14 having a de-interleaving circuit 38.
Abstract: The present invention relates to a system and method for reliably transmitting Internet Protocol (IP) data packets over fading Internet communication channels. The invented system 10 comprises a transmitting device 12 having an interleaver circuit 22 . The invented system 10 also includes a receiving device 14 having a de-interleaver circuit 38 . The transmitting device 12 and the receiving device 14 communicate over a fading Internet communication channel 16 . The transmitting device 12 applies error control coding to the IP packets before they are transmitted over the fading Internet communication channel 16 . The Interleaver circuit 22 interleaves the IP data packets before transmitting them over the fading Internet channel 16 . The receiving device 14 receives the interleaved IP packets from the fading Internet channel 16 . The de-interleaver circuit 38 de-interleaves the received IP data packets. The receiving device 14 also uses the error control coding to detect and correct any errors incurred during transmission. The interleaving “spreads out” transmission errors over several IP packets and thus makes the error control and correction process more effective and efficient.

11 citations

Proceedings ArticleDOI
05 Oct 1998
TL;DR: It was shown that binary BCH codes can be used to provide a highly effective error-control technique for ATM transmission on LOS circuits and Reed Solomon codes with erasure filling can provide an effective, high-rate, end-to-end coding scheme to protect against cell loss due to congestion in ATM networks and decoding failure events associated with the link codes.
Abstract: We described the error-control problems associated with supporting ATM transmission of multimedia services on line of sight (LOS) radio circuits. The major problems to address are associated with poor circuit quality and limited transmission bandwidths. Poor circuit quality is manifested by low received SNRs and high delivered BERs and can be improved by judicious application of error-control coding. The desire to support as many ATM users as possible and the constraint of limited bandwidth favor the use of high-rate coding techniques. To provide an acceptable QoS, however, the selected coding technique must be effective for all realistic channel conditions, including AWGN and slow Rician fading. It was shown that binary BCH codes can be used to provide a highly effective error-control technique for ATM transmission on LOS circuits. The wide selection of block lengths, rate, and error correction power allows solutions to be tailored to the wireless ATM application. It was shown that the best designs result when a powerful binary BCH code is used to protect the header and a somewhat less powerful code is used to protect the payload. The effects of residual uncorrected error events can then be addressed with an appropriate end-to-end error-control technique, or, in the case of MPEG video, with error concealment algorithms. It was also shown that Reed Solomon codes with erasure filling can provide an effective, high-rate, end-to-end coding scheme to protect against cell loss due to congestion in ATM networks and decoding failure events associated with the link codes.

7 citations


Cited by
More filters
Patent
15 Nov 2006
TL;DR: In this article, the authors present methods and systems for encoding digital watermarks into content signals, including window identifier for identifying a sample window in the signal; an interval calculator for determining a quantization interval of the sample window; and a sampler for normalizing sample window to provide normalized samples.
Abstract: Disclosed herein are methods and systems for encoding digital watermarks into content signals. Also disclosed are systems and methods for detecting and/or verifying digital watermarks in content signals. According to one embodiment, a system for encoding of digital watermark information includes: a window identifier for identifying a sample window in the signal; an interval calculator for determining a quantization interval of the sample window; and a sampler for normalizing the sample window to provide normalized samples. According to another embodiment, a system for pre-analyzing a digital signal for encoding at least one digital watermark using a digital filter is disclosed. According to another embodiment, a method for pre-analyzing a digital signal for encoding digital watermarks comprises: (1) providing a digital signal; (2) providing a digital filter to be applied to the digital signal; and (3) identifying an area of the digital signal that will be affected by the digital filter based on at least one measurable difference between the digital signal and a counterpart of the digital signal selected from the group consisting of the digital signal as transmitted, the digital signal as stored in a medium, and the digital signal as played backed. According to another embodiment, a method for encoding a watermark in a content signal includes the steps of (1) splitting a watermark bit stream; and (2) encoding at least half of the watermark bit stream in the content signal using inverted instances of the watermark bit stream. Other methods and systems for encoding/decoding digital watermarks are also disclosed.

603 citations

Patent
03 Jan 2007
TL;DR: In this article, a method for applying a digital watermark to a content signal is described, and a watermarking key is identified, which includes a binary sequence and information describing application of that binary sequence to the content signal.
Abstract: A method for applying a digital watermark to a content signal is disclosed. In accordance with such a method, a watermarking key is identified. The watermarking key includes a binary sequence and information describing application of that binary sequence to the content signal. The digital watermark is then encoded within the content signal at one or more locations determined by the watermarking key.

454 citations

Patent
04 Jun 2012
TL;DR: In this paper, the authors present methods and systems for transmitting streams of data, and also relate to generating packet watermarks and packet watermark keys, and an electronic method and system for purchasing good and services by establishing an account whereby a customer is credited with a predetermined amount of bandwidth usage.
Abstract: Disclosed herein are methods and systems for transmitting streams of data. The present invention also relates to generating packet watermarks and packet watermark keys. The present invention also relates to a computerized system for packaging data for transmission to a user. The system may utilize computer code to generate a bandwidth rights certificate that may include: at least one cryptographic credential; routing information for the transmission; and, optionally, a digital signature of a certificate owner; a unique identification code of a certificate owner; a certificate validity period; and pricing information for use of bandwidth. The present invention also relates to an electronic method and system for purchasing good and services by establishing an account whereby a customer is credited with a predetermined amount of bandwidth usage, and then charges are assessed against the account in an amount of bandwidth usage which corresponds to the agreed upon purchase value for the selected item.

255 citations

Patent
07 Dec 2000
TL;DR: In this paper, the authors proposed a system for enhancing trust in transactions, most particularly in remote transactions between a plurality of transactional parties, for instance a seller and buyer(s) of goods and/or services over a public computer network such as the internet.
Abstract: The invention discloses a system for enhancing trust in transactions, most particularly in remote transactions between a plurality of transactional parties, for instance a seller and buyer(s) of goods and/or services over a public computer network such as the internet. Trust is disclosed to be a multivalent commodity, in that the trust that is to be enhanced relates to information about the subject matter of the transactions (e.g., the suitability of the goods and services sold), the bona fides of the supplier of the goods and services, the appropriateness of a pricing structure for a particular transaction or series of transactions, a quantum of additional transactional value that may be imparted to the transactional relationship, security of information exchange, etc. An important contributor to trust for such aspects of the transaction is disclosed to be the use of highly-secure steganographic computer processing means for data identification, authentication, and transmission, such that confidence in the transaction components is enhanced. By providing an integrated multivalent system for enhancing trust across a variety of categories (for a variety of transaction species, including those in which the need for trust is greater on the part of one party than of another, as well as those in which both require substantial trust enhancement), the invention reduces barriers to forming and optimizing transactional relationships.

247 citations

Journal ArticleDOI
TL;DR: This is Applied Cryptography Protocols Algorithms And Source Code In C Applied Cryptographic Protocols algorithms and Source Code in C By Schneier Bruce Author Nov 01 1995 the best ebook that you can get right now online.

207 citations