System and method of applying adaptive privacy control regions to bitstream data
First Claim
1. A non-transitory computer readable medium storing instructions executable by one or more processing units, the instructions comprising instructions to:
- receive an indication of a first portion of a media file, the first portion comprising a first bitstream;
receive a first permission-setting for the first portion;
receive an indication of a first recipient for the first portion;
receive an indication of a second portion of the media file, the second portion comprising a second bitstream;
receive a second permission-setting for the second portion;
receive an indication of a second recipient for the second portion;
crop the first portion and the second portion;
generate a first scrambled portion and a second scrambled portion by transposing a first plurality of bits of the first cropped portion with a second plurality of bits of the second cropped portion, wherein the first cropped portion and the second cropped portion are of different lengths corresponding to different periods of time;
generate a first encryption key for the first scrambled portion based, at least in part, on the first permission-setting and the indication of the first recipient;
generate a second encryption key for the second scrambled portion based, at least in part, on the second permission-setting and the indication of the second recipient;
encrypt the first scrambled portion using the first encryption key and the second scrambled portion using the second encryption key;
generate a first control wave corresponding to the first encrypted portion and a second control wave corresponding to the second encrypted portion;
generate a first steganographic bitstream by multiplexing the first encrypted portion with the first control wave, and a second steganographic bitstream by multiplexing the second encrypted portion with the second control wave, wherein the first steganographic bitstream is the same length as first cropped portion and the second steganographic bitstream is the same length as the second portion; and
transmit the media file to the first recipient and the second recipient.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are systems to apply customized permission settings to protect particular portions of a document, and, in particular, documents that are of bitstream datatypes, encoded or not encoded, e.g., an audio filetype such as the MP3 audio format. The custom access permission settings may be implemented by obfuscating the protected portions of the original bitstream and then embedding “secret,” e.g., hidden and/or encrypted, versions of the obfuscated portions in parts of the data structure of the original file, e.g., in the form of “layers” that are held within audio stream containers such as channels. The content of the individual encrypted audio stream containers may then be decrypted according to each recipient'"'"'s permissions and layered on top of the obfuscated portions of the encoded media file before being rendered to the recipient.
43 Citations
20 Claims
-
1. A non-transitory computer readable medium storing instructions executable by one or more processing units, the instructions comprising instructions to:
-
receive an indication of a first portion of a media file, the first portion comprising a first bitstream; receive a first permission-setting for the first portion; receive an indication of a first recipient for the first portion; receive an indication of a second portion of the media file, the second portion comprising a second bitstream; receive a second permission-setting for the second portion; receive an indication of a second recipient for the second portion; crop the first portion and the second portion; generate a first scrambled portion and a second scrambled portion by transposing a first plurality of bits of the first cropped portion with a second plurality of bits of the second cropped portion, wherein the first cropped portion and the second cropped portion are of different lengths corresponding to different periods of time; generate a first encryption key for the first scrambled portion based, at least in part, on the first permission-setting and the indication of the first recipient; generate a second encryption key for the second scrambled portion based, at least in part, on the second permission-setting and the indication of the second recipient; encrypt the first scrambled portion using the first encryption key and the second scrambled portion using the second encryption key; generate a first control wave corresponding to the first encrypted portion and a second control wave corresponding to the second encrypted portion; generate a first steganographic bitstream by multiplexing the first encrypted portion with the first control wave, and a second steganographic bitstream by multiplexing the second encrypted portion with the second control wave, wherein the first steganographic bitstream is the same length as first cropped portion and the second steganographic bitstream is the same length as the second portion; and transmit the media file to the first recipient and the second recipient. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system, comprising:
-
a memory; and one or more processing units, communicatively coupled to the memory, wherein the memory stores instructions executable to cause the one or more processing units to; receive an indication of a first portion of a media file, the first portion comprising a first bitstream; receive a first permission-setting for the first portion; receive an indication of a first recipient for the first portion; receive an indication of a second portion of the media file, the second portion comprising a second bitstream; receive a second permission-setting for the second portion; receive an indication of a second recipient for the second portion; crop the first portion and the second portion; generate a first scrambled portion and a second scrambled portion by transposing a first plurality of bits of the first cropped portion with a second plurality of bits of the second cropped portion, wherein the first cropped portion and the second cropped portion are of different lengths corresponding to different periods of time; generate a first encryption key for the first scrambled portion based, at least in part, on the first permission-setting and the indication of the first recipient; generate a second encryption key for the second scrambled portion based, at least in part, on the second permission-setting and the indication of the second recipient; encrypt the first scrambled portion using the first encryption key and the second scrambled portion using the second encryption key; generate a first control wave corresponding to the first encrypted portion and a second control wave corresponding to the second encrypted portion; and generate a first steganographic bitstream by multiplexing the first encrypted portion with the first control wave, and a second steganographic bitstream by multiplexing the second encrypted portion with the second control wave, wherein the first steganographic bitstream is the same length as first cropped portion and the second steganographic bitstream is the same length as the second portion. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented method, comprising:
-
receiving an indication of a first portion of a media file, the first portion comprising a first bitstream; receiving a first permission-setting for the first portion; receiving an indication of a first recipient for the first portion; receiving an indication of a second portion of the media file, the second portion comprising a second bitstream; receiving a second permission-setting for the second portion; receiving an indication of a second recipient for the second portion; cropping the first portion and the second portion; generating a first scrambled portion and a second scrambled portion by transposing a first plurality of bits of the first cropped portion with a second plurality of bits of the second cropped portion, wherein the first cropped portion and the second cropped portion are of different lengths corresponding to different periods of time; generating a first encryption key for the first scrambled portion based, at least in part, on the first permission-setting for the first portion and the indication of the first recipient of the first portion; generating a second encryption key for the second scrambled portion based, at least in part, on the second permission-setting and the indication of the second recipient; encrypting the first scrambled portion using the first encryption key and the second scrambled portion using the second encryption key; generating a first control wave corresponding to the first encrypted portion and a second control wave corresponding to the second encrypted portion; generating a first steganographic bitstream by multiplexing the first encrypted portion with the first control wave, and a second steganographic bitstream by multiplexing the second encrypted portion with the second control wave, wherein the first steganographic bitstream is the same length as first cropped portion and the second steganographic bitstream is the same length as the second portion; and transmitting the media file to the first recipient. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification