Utilizing data reduction in stegnographic and cryptographic systems
First Claim
1. A method of protecting a data signal comprising the steps of:
- applying a data reduction technique to reduce the data signal into a reduced data signal;
subtracting said reduced data signal from the data signal to produce a remainder signal;
embedding a first watermark into said reduced data signal to produce a watermarked, reduced data signal;
embedding a second watermark into said remainder signal to produce a watermarked remainder signal; and
adding said watermarked, reduced data signal to said watermarked remainder signal to produce an output signal.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to methods for protecting a data signal using the following techniques: applying a data reduction technique to reduce the data signal into a reduced data signal; subtracting the reduced data signal from the data signal to produce a remainder signal; embedding a first watermark into the reduced data signal to produce a watermarked, reduced data signal; and adding the watermarked, reduced data signal to the remainder signal to produce an output signal. A second watermark may be embedded into the remainder signal before the final addition step. Further, cryptographic techniques may be used to encrypt the reduced data signals and to encrypt the remainder signals before the final addition step. The present invention also relates to systems for securing a data signal. Such systems may include computer devices for applying a data reduction technique to reduce the data signal into a reduced data signal and means to subtract the reduced data signal from the data signal to produce a remainder signal. Such systems may include means to apply a first cryptographic technique to encrypt the reduced data signal to produce an encrypted, reduced data signal and means to apply a second cryptographic technique to encrypt the remainder signal to produce an encrypted remainder signal; and means to add the encrypted, reduced data signal to the encrypted remainder signal to produce an output signal.
-
Citations
70 Claims
-
1. A method of protecting a data signal comprising the steps of:
-
applying a data reduction technique to reduce the data signal into a reduced data signal; subtracting said reduced data signal from the data signal to produce a remainder signal; embedding a first watermark into said reduced data signal to produce a watermarked, reduced data signal; embedding a second watermark into said remainder signal to produce a watermarked remainder signal; and adding said watermarked, reduced data signal to said watermarked remainder signal to produce an output signal. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of protecting a data signal comprising the steps of:
-
applying a data reduction technique to reduce the data signal into a reduced data signal; subtracting said reduced data signal from the data signal to produce a remainder signal; embedding a first watermark into said reduced data signal to produce a watermarked, reduced data signal; embedding a second watermark into said remainder signal to produce a watermarked remainder signal; and adding said watermarked, reduced data signal to said watermarked remainder signal to produce an output signal. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method of protecting a data signal comprising the steps of;
-
applying a data reduction technique to reduce the data signal into a reduced data signal; subtracting said reduced data signal from the data signal to produce a remainder signal; using a first scrambling technique to scramble said reduced data signal to produce a scrambled, reduced data signal; using a second scrambling technique to scramble said remainder data signal to produce a scrambled, remainder data signal; and adding said scrambled, reduced data signal to said scrambled remainder signal to produce an output signal. - View Dependent Claims (20, 21, 22, 23)
-
-
24. A method, of securing a data signal comprising;
-
applying a data reduction technique to reduce the data signal into a reduced data signal; subtracting said reduced data signal from the data signal to produce a remainder signal; using a first cryptographic technique to encrypt the reduced data signal to produce an encrypted, reduced data signal; using a second cryptographic technique to encrypt the remainder data signal to produce an encrypted remainder data signal; and adding said encrypted, reduced data signal to said encrypted remainder signal to produce an output signal. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A system for securing a data signal comprising;
-
means to apply a data reduction technique to reduce the data signal into a reduced data signal; means to subtract said reduced data signal from the data signal to produce a remainder signal; means to apply a first cryptographic technique to encrypt the reduced data signal to produce an encrypted, reduced data signal; means to apply a second cryptographic technique to encrypt the remainder data signal to produce an encrypted remainder data signal; and means to add said encrypted, reduced data signal to said encrypted remainder signal to produce an output signal. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43)
-
-
44. A system for securing a data signal, said system comprising;
-
(a) a computer processor; (b) at least one computer memory; (c) a data reduction algorithm; and (d) at least one digital watermarking algorithm; wherein said computer processor is supplied with programming in conjunction with said computer memory; (I) to apply said data reduction algorithm to the data signal to yield a reduced data signal, and to subtract said reduced data signal from the data signal to produce a remainder signal; (II) to embed a first watermark into said reduced data signal by application of said at least one digital watermarking algorithm to produce a watermarked, reduced data signal; (III) to embed a second watermark into said remainder signal by application of said at least one digital watermarking algorithm to produce a watermarked remainder signal; and (IV) to add said watermarked, reduced data signal to said watermarked remainder signal to produce an output signal. - View Dependent Claims (45, 46, 47, 48, 49)
-
-
50. A method for securing a data signal comprising the steps of:
-
evaluating the data signal to determine its characteristics and reducibility; selecting at least one appropriate data reduction technique for the data signal based on the data signal'"'"'s characteristics; applying said at least one appropriate data reduction technique to the data signal to produce a reduced data signal; embedding at least one digital watermark in the data signal in the reduced data signal; and supplying an output signal corresponding to the data signal, said output signal comprising said watermark and said reduced data signal. - View Dependent Claims (51, 52, 53, 54, 55, 56, 57, 58)
-
-
59. A method for the protection of a data signal, comprising the steps of:
-
(a) defining and analyzing a plurality of data substreams within the data signal; (b) associating at least one key or key pair with data reduction digital watermarking for at least one of said data substreams, wherein the use of data reduction comprises creation of a reduced portion of the data signal and a remainder portion of the data signal; (c) employing said at least one key or key pairs for at least one step selected from the group of; (i) identifying at least one associated watermark (ii) encoding at least one associated watermark; (iii) detecting at least one associated watermark;
or(iv) decoding at least one associated watermark. - View Dependent Claims (60)
-
-
61. A method for protected distribution of a data file comprising:
-
(a) embedding one or more digital watermarks in the data file using data reduction techniques in creating said digital watermark, wherein the use of data reduction techniques comprises creation of a reduced portion of the data file and a remainder portion of the data file; (b) and distributing the digitally watermarked file to an end user. - View Dependent Claims (62, 63, 64, 65, 66, 67, 68, 69, 70)
-
Specification