System and method for privacy enhancement via adaptive cryptographic embedding
First Claim
1. A method of privacy enhancement for surveillance, comprising the steps of:
- designating a region of a data in an input data stream;
encrypting the region of data, in place within said input data stream, to form a protected data stream; and
playing the protected data stream.
0 Assignments
0 Petitions
Accused Products
Abstract
The system and method enhances privacy and security by determining parts of a data stream that should not be publicly available and doing in-place encryption of that data while leaving the remaining data unencrypted for direct usage in security. The system is composed of a designator, that determines what parts of the data stream require protection, and a protector, that performs the in-place encryption. The resulting protected data stream can be played/displayed using the same standard technology as for the original data stream, with the encrypted portions appearing as random noise. The system also supports an extractor, which can, given access to the appropriate keys, invert the encryption and provide back the original data stream.
74 Citations
20 Claims
-
1. A method of privacy enhancement for surveillance, comprising the steps of:
-
designating a region of a data in an input data stream; encrypting the region of data, in place within said input data stream, to form a protected data stream; and playing the protected data stream. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system of privacy enhancement for surveillance, comprising:
-
a designator receiving an input data stream and defining a region of data to privacy protect; a protector receiving the input data stream and the region of data and encrypting in place the region of data to form a protected data stream. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A method of privacy enhancement for surveillance, comprising the steps of:
-
designating a region of a data in an input data stream; encrypting the region of data to form a protected data stream; and playing the protected data stream using a standard player. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification