System and method of applying multiple adaptive privacy control layers to multi-channel bitstream data
First Claim
1. A non-transitory computer readable medium storing instructions executable by one or more processing units, the instructions comprising instructions to:
- receive an indication of a first portion of a first bitstream of a media file, wherein the first bitstream corresponds to a first channel;
receive an indication of a second portion of a second bitstream of a media file, wherein the second bitstream corresponds to a second channel;
crop the first and second portions;
generate a first scrambled portion and a second scrambled portion by transposing a plurality of bits of the first cropped portion with a plurality of bits of the second cropped portion, wherein the first and second cropped portions are of different lengths corresponding to different periods of time;
encrypt the first scrambled portion with a first encryption key, and the second scrambled portion with a second encryption key;
generate a first control wave for the first encrypted portion and a second control wave for the second encrypted portion;
generate a first steganographic wave by multiplexing the first encrypted portion with the first control wave, and a second steganographic wave by multiplexing the second encrypted portion with the second control wave, wherein the first steganographic wave is the same length as the first cropped portion and the second steganographic wave is the same length as the second cropped portion; and
append the first and second steganographic waves to the media file.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are systems to apply customized permission settings to protect particular portions of a document, and, in particular, documents that are of bitstream datatypes containing multiple channels of audio, encoded or not encoded. The custom access permission settings may be implemented by obfuscating the protected portions of the original bitstream and then embedding “secret,” e.g., hidden and/or encrypted, versions of the obfuscated portions in parts of the data structure of the original file, e.g., in the form of “layers” that are held within audio stream containers such as channels. The content of the individual encrypted audio stream containers may then be decrypted according to each recipient'"'"'s permissions and layered on top of the obfuscated portions of the encoded media file before being rendered to the recipient.
-
Citations
17 Claims
-
1. A non-transitory computer readable medium storing instructions executable by one or more processing units, the instructions comprising instructions to:
-
receive an indication of a first portion of a first bitstream of a media file, wherein the first bitstream corresponds to a first channel; receive an indication of a second portion of a second bitstream of a media file, wherein the second bitstream corresponds to a second channel; crop the first and second portions; generate a first scrambled portion and a second scrambled portion by transposing a plurality of bits of the first cropped portion with a plurality of bits of the second cropped portion, wherein the first and second cropped portions are of different lengths corresponding to different periods of time; encrypt the first scrambled portion with a first encryption key, and the second scrambled portion with a second encryption key; generate a first control wave for the first encrypted portion and a second control wave for the second encrypted portion; generate a first steganographic wave by multiplexing the first encrypted portion with the first control wave, and a second steganographic wave by multiplexing the second encrypted portion with the second control wave, wherein the first steganographic wave is the same length as the first cropped portion and the second steganographic wave is the same length as the second cropped portion; and append the first and second steganographic waves to the media file. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system, comprising:
-
a memory; and one or more processing units, communicatively coupled to the memory, wherein the memory stores instructions to configure the one or more processing units to; receive an indication of a first portion of a first bitstream of a media file, wherein the first bitstream corresponds to a first channel; receive an indication of a second portion of a second bitstream of a media file, wherein the second bitstream corresponds to a second channel; crop the first and second portions; scramble the first cropped portion and the second cropped portion by transposing a plurality of bits of the first cropped portion with a plurality of bits of the second cropped portion, wherein the first and second cropped portions are of different lengths corresponding to different periods of time; encrypt the first scrambled portion with a first encryption key, and the second scrambled portion with a second encryption key; generate a first control wave for the first encrypted portion and a second control wave for the second encrypted portion; generate a first steganographic wave by multiplexing the first encrypted portion with the first control wave, and a second steganographic wave by multiplexing the second encrypted portion with the second control wave, wherein the first steganographic wave is the same length as the first cropped portion and the second steganographic wave is the same length as the second cropped portion; and append the first and second steganographic waves to the media file. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method executed by one or more processing units, the method comprising:
-
receiving an indication of a first portion of a first bitstream of a media file, wherein the first bitstream corresponds to a first channel; receiving an indication of a second portion of a second bitstream of a media file, wherein the second bitstream corresponds to a second channel; cropping the first and second portions; scrambling the first cropped portion and the second cropped portion, wherein scrambling the first cropped portion and the second cropped portion comprises transposing a plurality of bits of the first cropped portion with a plurality of bits of the second cropped portion, wherein the first and second cropped portions are of different lengths corresponding to different periods of time; encrypting the first scrambled portion with a first encryption key, and the second scrambled portion with a second encryption key; generating a first control wave for the first encrypted portion and a second control wave for the second encrypted portion; generating a first steganographic wave by multiplexing the first encrypted portion with the first control wave, and a second steganographic wave by multiplexing the second encrypted portion with the second control wave, wherein the first steganographic wave is the same length as the first cropped portion and the second steganographic wave is the same length as the second cropped portion; and appending the first and second steganographic waves to the media file. - View Dependent Claims (14, 15, 16, 17)
-
Specification