Data hiding in digital multimedia
First Claim
1. A method for hiding authentication data within a multimedia data stream having a first media channel and a second media channel, the method comprising the steps of:
- obtaining a first set of authentication data;
said first set of authentication data being based on data contained in the first media channel;
obtaining a second set of authentication data;
said second set of authentication data being based on data contained in the second media channel;
hiding the first set of authentication data in the first media channel and the second media channel; and
hiding the second authentication data in the first media channel and the second media channel,wherein an active data stream is inserted into a high capacity region of a visual channel, while other control data are embedded into a relatively high robustness region of the visual channel, the high capacity region having higher capacity and lower robustness than the high robustness region.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for hiding authentication data within a multimedia data stream provides for cross-authentication. The method includes the step of obtaining a first set of authentication data, where the first set of authentication data is based on data contained in a first media channel of the multimedia data stream. The method further includes the step of hiding the first set of authentication data in a second media channel of a multimedia data stream. When dealing with active data streams, the present invention provides for hiding a first subset of the active data stream in a visual channel of the multimedia data stream. A second subset of the active data stream is then hidden in the audio channel of the multimedia data stream. In one embodiment, the first subset includes executable content, where the second subset includes a controlled data stream.
-
Citations
30 Claims
-
1. A method for hiding authentication data within a multimedia data stream having a first media channel and a second media channel, the method comprising the steps of:
-
obtaining a first set of authentication data; said first set of authentication data being based on data contained in the first media channel; obtaining a second set of authentication data; said second set of authentication data being based on data contained in the second media channel; hiding the first set of authentication data in the first media channel and the second media channel; and hiding the second authentication data in the first media channel and the second media channel, wherein an active data stream is inserted into a high capacity region of a visual channel, while other control data are embedded into a relatively high robustness region of the visual channel, the high capacity region having higher capacity and lower robustness than the high robustness region. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for hiding authentication data within a multimedia data stream having a first media channel, a second media channel, and a third media channel, the method comprising the steps of:
-
obtaining a first set of authentication data; said first set of authentication data being based on data contained in the first media channel; obtaining a second set of authentication data; said second set of authentication data being based on data contained in the second media channel; obtaining a third set of authentication data; said third set of authentication data being based on data contained in the third media channel; hiding the first set of authentication data in the second media channel; hiding the second set of authentication data in the first media channel; hiding the third set of authentication data in the first media channel and the second media channel; and hiding the first set of authentication data and the second set of authentication data in the third media channel, wherein an active data stream is inserted into a high capacity region of a visual channel, while other control data are embedded into a relatively high robustness region of the visual channel, the high capacity region having higher capacity and lower robustness than the high robustness region. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A method for hiding authentication data within a multimedia data stream having a first media channel and a second media channel, the method comprising the steps of:
-
obtaining a first set of authentication data; said first set of authentication data being based on data contained in the first media channel; obtaining a second set of authentication data; said second set of authentication data being based on data contained in the second media channel; hiding the first set of authentication data in the first media channel and the second media channel; hiding the second authentication data in the first media channel and the second media channel; and synchronously hiding authentication data obtained from all data channels of the multimedia data stream in every, individual data channel of the multimedia data stream, wherein an active data stream is inserted into a high capacity region of a visual channel, while other control data are embedded into a relatively high robustness region of the visual channel, the high capacity region having higher capacity and lower robustness than the high robustness region.
-
Specification