Digital watermark key generation
First Claim
Patent Images
1. A digital watermark key generation method, the key providing security for a plural-bit message, said method comprising:
- providing a plural-bit seed;
randomizing the plural-bit seed; and
encoding the randomized plural-bit seed with convolutional encoding, the encoded seed comprising a key.
3 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to message encoding. In a first implementation, a message is provided. The message is transformed by a secret key. The secret key is generated by providing a plural-bit seed. The seed is randomized and then error correction encoded. We prefer tail-biting convolutional encoding for our error correction encoding. The encoded seed forms a secure key, which is used to transform the message prior to embedding.
-
Citations
24 Claims
-
1. A digital watermark key generation method, the key providing security for a plural-bit message, said method comprising:
-
providing a plural-bit seed;
randomizing the plural-bit seed; and
encoding the randomized plural-bit seed with convolutional encoding, the encoded seed comprising a key. - View Dependent Claims (2, 3, 4, 5, 6, 16, 17, 18, 19)
-
-
7. A method of providing information to transform a plural-bit message for steganographic encoding, said method comprising:
-
providing a unique plural-bit number;
altering the unique plural-bit number;
error correction encoding the altered plural-bit number, wherein the error correction encoded, altered plural-bit number comprises information for transforming an independent message. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 20)
-
-
21. A method of generating a secure key for use with machine-readable indicia, said method comprising:
-
obtaining a unique identifier representing an entity or client;
altering the unique identifier in a random or pseudo-random manner;
error correction encoding the altered unique identifier; and
transforming a plural-bit message with the error correction encoded altered unique identifier to produce a secure key. - View Dependent Claims (22, 23, 24)
-
Specification