×

Secured signal modification and verification with privacy control

  • US 7,100,050 B1
  • Filed: 05/15/2000
  • Issued: 08/29/2006
  • Est. Priority Date: 04/13/1998
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for using watermarks to distribute and authenticate human perceptible source data sets, comprising;

  • digitizing and segmenting a human perceptible source data set into a plurality of non-overlapping digitized segments and a corresponding plurality of overlapping digitized segments, wherein;

    each non-overlapping segment is embedded within its corresponding overlapping segment in the same manner, andsaid digitizing comprises a digital representation of said human perceptible source data set, and digital representation including digital elements, each said element being divided into high order bits and low order bits, said high order bits being sufficient to preserve the human perceptibility of said source data set;

    creating a watermarked version of said source data set, wherein said creating a watermarked version of said source data set comprises, for each of said plurality of corresponding segments;

    adding privacy control to said high order bits of said overlapping segment, resulting in a data set including encrypted high order bits;

    applying a watermarked algorithm to said data set including encrypted high order bits, said algorithm resulting in a data set reduced in size;

    mapping said reduced data set onto the low order bits of said non-overlapping segment, thereby replacing said low order bits, said reduction in size being sufficient such that said mapping results in spare low order bits being left over, some of said spare low order bits being used to indicate watermark attributes, wherein said mapping modifies a portion of said low order bits, said portion being adjustable downward to achieve higher fidelity and adjustable upward to achieve higher security;

    distributing said watermarked data set;

    applying a privacy release algorithm to said watermarked data set; and

    authenticating said watermarked data set, wherein said authenticating is performed on a cropped portion of said watermarked data set, said watermark attributes being used to align said over-lapping segments.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×