摘要 |
Data is protected from unauthorized copying by rescrambling an unauthorized version of the data, but descrambling an authorized version of the data. This is done using a trigger signal. One property of the trigger signal is that it is preserved through signal transformations, such as one or more of compression, decompression, analog to digital conversion, and digital to analog conversion. As a result of this property the trigger signal can be detected in either scrambled or descrambled data. The trigger signal is embedded into the data to form watermarked data. The watermarked data is passed through a descrambler, where the trigger signal, if present, is extracted. A descrambling key and a descrambling algorithm are applied to the watermarked data if the trigger signal is present, but not applied to the watermarked data if the trigger signal is not present. |