Method and system for managing access to data through data transformation
First Claim
1. A method for managing access to data by utilizing management information comprising a plurality of bits embedded in the data through data transformation without changing the amount of the data, the method comprising the steps of:
- defining a plurality of sets of data regions in the data for the plurality of bits to be embedded in the data, each of the data regions in each set having at least one pixel and the data regions in each set being in mutually high characteristic correlation with each other;
comparing characteristic values between the data regions in each set and embedding a bit of the plurality of bits in each set of data regions by expressing the bit as a function of the characteristic values comparison and a value of the bit;
extracting the plurality of bits of the management information embedded in the data by comparing the characteristic values between the data regions in the defined plurality of sets; and
managing access to said data according to said extracted management information.
1 Assignment
0 Petitions
Accused Products
Abstract
In providing a system that can manage access to data to effectively prevent illegal access to the data or the like, there is provided a system for embedding access management information that prepares management information for managing access to the data, and embeds the management information in the data through data transformation without changing amount of data. In managing access to data, there is provided a method that extracts management information embedded in the data through data deformation without changing amount of data, and manages access to the data according to the extracted management information. There is also provided a method for changing management of access to the data according to the type of medium in which the data is stored (RAM or ROM). The management information further contains information for controlling recording of the data, reception of the data, playback of the data, interference of output of the data, duplication history of the data, or modification of the management information. The access management method can prevent illegal duplication of data or the like, and can effectively protect a work.
-
Citations
11 Claims
-
1. A method for managing access to data by utilizing management information comprising a plurality of bits embedded in the data through data transformation without changing the amount of the data, the method comprising the steps of:
-
defining a plurality of sets of data regions in the data for the plurality of bits to be embedded in the data, each of the data regions in each set having at least one pixel and the data regions in each set being in mutually high characteristic correlation with each other;
comparing characteristic values between the data regions in each set and embedding a bit of the plurality of bits in each set of data regions by expressing the bit as a function of the characteristic values comparison and a value of the bit;
extracting the plurality of bits of the management information embedded in the data by comparing the characteristic values between the data regions in the defined plurality of sets; and
managing access to said data according to said extracted management information. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for managing access to data by utilizing management information comprising a plurality of bits embedded in said data through data transformation without changing the amount of data, the system comprising:
-
a mechanism for defining a plurality of sets of data regions in the data for the plurality of bits to be embedded in the data, each of the data regions in each set having at least one pixel and the data regions in each set being in mutually high characteristic correlation with each other;
a mechanism for comparing characteristic values between the data regions in each set and embedding a bit of the plurality of bits in each set of data regions by expressing the bit as a function of the characteristic values comparison and a value of the bit;
an extractor for extracting the plurality of bits of the management information embedded in the data by comparing the characteristic values between the data regions in the defined plurality of sets; and
a unit for managing access to said data according to said extracted management information. - View Dependent Claims (7, 8, 9, 10)
a unit for, after managing the access to said data according to said management information, embedding, separate from said management information, additional information for managing access to said data in said data; and
a unit for managing subsequent access to said data according to said management information and said additional information.
-
-
11. A computer program device readable by a machine, tangibly embodying a program of instructions executable by the machine to perform a method for managing access to data by utilizing management information comprising a plurality of bits embedded in the data through data transformation without changing the amount of the data, the method comprising:
-
defining a plurality of sets of data regions in the data for the plurality of bits to be embedded in the data, each of the data regions in each set having at least one pixel and the data regions in each set being in mutually high characteristic correlation with each other;
comparing characteristic values between the data regions in each set and embedding a bit of the plurality of bits in each set of data regions by expressing the bit as a function of the characteristic values comparison and a value of the bit;
extracting the plurality of bits of the management information embedded in the data by comparing the characteristic values between the data regions in the defined plurality of sets; and
managing access to the data according to the extracted management information.
-
Specification