METHOD AND SYSTEM FOR SECURE CODING OF ARBITRARILY SHAPED VISUAL OBJECTS
First Claim
Patent Images
1. A computer implementable method for securely encoding an image, characterized by the steps of:
- a. selecting one or more objects in the image from the background of the image;
b. separating the one or more objects from the background; and
c. compressing and encrypting, or facilitating the compression and encryption, by one or more computer processors, each of the one or more objects using a single coding scheme.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to a method and system for secure coding of arbitrarily shaped visual objects. More specifically, a system and method are provided for encoding an image, characterized by the steps of selecting one or more objects in the image from the background of the image, separating the one or more objects from the background, and compressing and encrypting, or facilitating the compression and encryption, by one or more computer processors, each of the one or more objects using a single coding scheme. The coding scheme also is operable to decrypt and decode each of the objects.
-
Citations
25 Claims
-
1. A computer implementable method for securely encoding an image, characterized by the steps of:
-
a. selecting one or more objects in the image from the background of the image; b. separating the one or more objects from the background; and c. compressing and encrypting, or facilitating the compression and encryption, by one or more computer processors, each of the one or more objects using a single coding scheme. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer implementable method for encoding an image using a secure ST-SPIHT (Shape and Texture Set Partitioning in Hierarchical Tree) scheme, characterized by the steps of:
-
a. selecting an object from the image; b. obtaining in a first color space a matrix of color texture samples of the image; c. obtaining a shape mask of spatial positions inside the object and outside the object; d. converting the matrix to a converted matrix in a second color space and applying the shape mask to the converted matrix; e. transforming the converted matrix to a transformed matrix using a shape-adaptive discrete wavelet transform; f. coding, or facilitating the coding, by one or more computer processors, the transformed matrix and the shape mask with a ST-SPIHT coder to produce a unified embedded output bit-stream; and g. selectively encrypting the output bit-stream using a stream cipher applied to individual bits using a private key. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer implementable method for decoding an image using a secure ST-SPIHT (Shape and Texture Set Partitioning in Hierarchical Tree) scheme, characterized by the steps of:
-
h. decrypting an output bit-stream using a stream cipher applied to individual bits using a private key; i. decoding, or facilitating the decoding, by one or more computer processors, the bit-stream using a ST-SPIHT decoder to provide incremental instructions to the decryption stream cipher as to which bits to decrypt, and obtain a transformed matrix and a shape mask; j. inverse transforming the transformed matrix to a converted matrix in a second color space using an inverse shape-adaptive discrete wavelet transform; and k. converting the converted matrix to a matrix in a first color space for representing color texture samples of the image. - View Dependent Claims (19)
-
-
20. A computer system for securely encoding an image, the computer system comprising one or more computers configured to provide, or provide access to, a secure coding and decoding utility, the secure coding and decoding utility characterized in that it is operable to:
-
l. select one or more objects in the image from the background of the image; m. separate the one or more objects from the background; and n. compress and encrypt, or facilitate the compression and encryption, by one or more computer processors, each of the one or more objects using a single coding scheme. - View Dependent Claims (21, 22)
-
-
23. A computer program product for securely encoding an image, the computer program product comprising computer instructions and data which when made available to one or more computer processors configure the one or more computer processors to provide a secure encoding and decoding utility, the secure encoding and decoding utility characterized in that it is operable to:
-
o. select one or more objects in the image from the background of the image; p. separate the one or more objects from the background; and q. compress and encrypt, or facilitating the compression and encryption, by one or more computer processors, each of the one or more objects using a single coding scheme. - View Dependent Claims (24, 25)
-
Specification