Security based on subliminal and supraliminal channels for data objects
2 Assignments
0 Petitions
Accused Products
Abstract
This invention relates to security for data objects; more particularly, the present invention relates to improved security based on subliminal and supraliminal channels for data objects. In another embodiment, a method of protecting a data object comprises: steganographically encoding a subset of candidate bits in a digitized sample stream; perceptibly manipulating data in the digitized sample stream; and combining the imperceptible and perceptible data changes to create a secure/unique digital sample stream. In yet another embodiment, a method for securing a data signal comprises: preanalyzing said data signal for candidate watermark/signature bits; steganographically encoding independent data into the data signal into a subset of the candidate watermark bits, at least one time; and encoding the data signal subsequently with a perceptible technique.
7 Citations
43 Claims
-
1-15. -15. (canceled)
-
16. A method of protecting a data object comprising:
-
steganographically encoding a subset of candidate bits in a digitized sample stream; perceptibly manipulating data in the digitized sample stream; and combining the imperceptible and perceptible data changes to create a secure/unique digital sample stream. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A method for securing a data signal comprising:
-
preanalyzing said data signal for candidate watermark/signature bits; steganographically encoding independent data into the data signal into a subset of the candidate watermark bits, at least one time; and encoding the data signal subsequently with a perceptible technique. - View Dependent Claims (27)
-
-
28. A method of protecting a data signal comprising the steps of:
-
imperceptibly embedding data using a watermarking technique; perceptibly signing the data using the receiver'"'"'s public key; encrypting the data signal using the receiver'"'"'s public key and the private key used to watermark the signal; and enabling a receiver to authenticate/verify (separate steps) the data signal while connected to a communications channel.
-
-
29. A method for securing a data signal comprising:
-
preanalyzing said data signal for candidate watermark/signature bits; steganographically encoding independent data into the data signal into a subset of the candidate watermark bits, at least one time; and subsequently steganographically encoding the remainder bits. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36)
-
-
37. A method for protecting a data signal comprising:
-
using a predetermined key to imperceptibly encode a data stream with a first set of 5 independent data; providing a housing to house said data stream; and placing on the housing a perceptible machine-readable unique identifier. - View Dependent Claims (38)
-
-
39. A device for securing a data signal said device comprising:
-
a receiver for receiving the data signal; an analyzer to analyze said data signal for candidate watermark bits;
an encoder for steganographically encoding independent data into the data signal into a subset of the candidate watermark bits, at least one time; andan encoder for steganographically encoding the remainder bits. - View Dependent Claims (40, 41, 42)
-
-
43-55. -55. (canceled)
Specification