Steganographic method and device
First Claim
Patent Images
1. A computer-based method for identifying digital content, the method comprising:
- receiving encoded digital content, wherein encoding of said encoded digital content comprises a steganographic mapping process that uses at least one of a plurality of keys; and
decoding additional information from the encoded digital content using at least one of the plurality of keys, and wherein the key is derived from the encoding process;
wherein the additional information includes an encode hash of at least a portion of the content and further comprising generating a decode hash of at least a portion of the content and comparing said encode hash to said decode hash.
4 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and method for encoding and decoding additional information into a stream of digitized samples in an integral manner. The information is encoded using special keys. The information is contained in the samples, not prepended or appended to the sample stream. The method makes it extremely difficult to find the information in the samples if the proper keys are not possessed by the decoder. The method does not cause a significant degradation to the sample stream. The method is used to establish ownership of copyrighted digital multimedia content and provide a disincentive to piracy of such material.
-
Citations
99 Claims
-
1. A computer-based method for identifying digital content, the method comprising:
- receiving encoded digital content, wherein encoding of said encoded digital content comprises a steganographic mapping process that uses at least one of a plurality of keys; and
decoding additional information from the encoded digital content using at least one of the plurality of keys, and wherein the key is derived from the encoding process;
wherein the additional information includes an encode hash of at least a portion of the content and further comprising generating a decode hash of at least a portion of the content and comparing said encode hash to said decode hash. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 11, 12)
- receiving encoded digital content, wherein encoding of said encoded digital content comprises a steganographic mapping process that uses at least one of a plurality of keys; and
-
10. A computer-based method for identifying digital content, the method comprising:
- receiving encoded digital content, wherein encoding of said encoded digital content comprises a steganographic mapping process that uses at least one of a plurality of keys; and
decoding additional information from the encoded digital content using at least one of the plurality of keys, and wherein the key is derived from the encoding process;
wherein the additional information includes a watermark comprising a one way function of at least a portion of the content that contains the watermark, wherein the one way function is insensitive to the encoding of the additional information;
wherein the one way function generates at least one selected from the following group consisting of;
a hash, a signature, a message digest and a certificate.
- receiving encoded digital content, wherein encoding of said encoded digital content comprises a steganographic mapping process that uses at least one of a plurality of keys; and
-
13. A computer-based method for encoding additional information into digital content, the method comprising:
-
receiving digital content to be encoded; and encoding the additional information into the digital content, wherein the encoding comprises a steganographic cipher process that uses at least one of a plurality of keys to generate at least one unique encoded copy of the digital content, and wherein the encoded additional information is unique to the encoded copy; wherein the additional information includes an encode hash of at least a portion of the content and further comprising generating a decode hash of at least a portion of the content and comparing said encode hash to said decode hash. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A computer-based method for encoding additional information into digital content, the method comprising:
-
receiving digital content to be encoded; and encoding the additional information into the digital content, wherein the encoding comprises a steganographic cipher process that uses at least one of a plurality of keys to generate at least one unique encoded copy of the digital content, and wherein the encoded additional information is unique to the encoded copy; wherein the additional information includes a watermark comprising a one way function of at least a portion of the content that contains the watermark, wherein the one way function is insensitive to the encoding of the additional information; wherein the one way function generates at least one selected from the following group consisting of;
a hash, a signature, a message digest and a certificate. - View Dependent Claims (31)
-
-
32. A computer-based method for tamper proofing digital content, the method comprising:
-
calculating a one way function of additional information, the information comprising data to be encoded into the content and information based on the content, such that the one way function is insensitive to the changes introduced into the content by the encoding process; and encoding the additional information into the content using a mapping function that selects one or more keys from a plurality of pre-established keys, and wherein the selected key comprises information derived from the encoding process. - View Dependent Claims (33)
-
-
34. A non-transitory computer-readable medium having therein stored instructions adapted to be executed by a processor, which instructions when executed result in a process comprising:
- receiving encoded content, wherein encoding of said encoded content comprises a steganographic mapping process that uses at least one of a plurality of keys; and
decoding additional information from the encoded content using at least one of the plurality of keys, and wherein the key is derived from the encoding process;
wherein the additional information includes an encode hash of at least a portion of the content and further comprising generating a decode hash of at least a portion of the content and comparing said encode hash to said decode hash. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
- receiving encoded content, wherein encoding of said encoded content comprises a steganographic mapping process that uses at least one of a plurality of keys; and
-
45. A non-transitory computer-readable medium having therein stored instructions adapted to be executed by a processor, which instructions when executed result in a process comprising:
- receiving encoded content, wherein encoding of said encoded content comprises a steganographic mapping process that uses at least one of a plurality of keys; and
decoding additional information from the encoded content using at least one of the plurality of keys, and wherein the key is derived from the encoding process;
wherein the additional information includes a watermark comprising a one way function of at least a portion of the content that contains the watermark, wherein the one way function is insensitive to the encoding of the additional information;
wherein the one way function generates at least one selected from the following group consisting of;
a hash, a signature, a message digest and a certificate.
- receiving encoded content, wherein encoding of said encoded content comprises a steganographic mapping process that uses at least one of a plurality of keys; and
-
46. A non-transitory computer-readable medium having therein stored instructions adapted to be executed by a processor, which instructions when executed result in a process comprising:
-
receiving content to be encoded; and encoding the additional information into the content, wherein the encoding comprises a steganographic cipher process that uses at least one of a plurality of keys to generate at least one unique encoded copy of the content, and wherein the encoded additional information is unique to the encoded copy; wherein the additional information includes an encode hash of at least a portion of the content and further comprising generating a decode hash of at least a portion of the content and comparing said encode hash to said decode hash. - View Dependent Claims (47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62)
-
-
63. A non-transitory computer-readable medium having therein stored instructions adapted to be executed by a processor, which instructions when executed result in a process comprising:
-
receiving content to be encoded; and encoding the additional information into the content, wherein the encoding comprises a steganographic cipher process that uses at least one of a plurality of keys to generate at least one unique encoded copy of the content, and wherein the encoded additional information is unique to the encoded copy; wherein the additional information includes a watermark comprising a one way function of at least a portion of the content that contains the watermark, wherein the one way function is insensitive to the encoding of the additional information; wherein the one way function generates at least one selected from the following group consisting of;
a hash, a signature, a message digest and a certificate. - View Dependent Claims (64)
-
-
65. A non-transitory computer-readable medium having therein stored instructions adapted to be executed by a processor, which instructions when executed result in a process comprising:
-
calculating a one way function of additional information, the information comprising data to be encoded into the content and information based on the content, such that the one way function is insensitive to the changes introduced into the content by the encoding process; and encoding the additional information into the content using a mapping function that selects one or more keys from a plurality of preestablished keys, and wherein the selected key comprises information derived from the encoding process. - View Dependent Claims (66)
-
-
67. A system for identifying content, the system comprising:
- a receiver for receiving encoded content, wherein encoding of said encoded content comprises a steganographic mapping process that uses at least one of a plurality of keys; and
a decoder, said decoder comprising at least one of(1) a CPU and non transitory memory storing a decode algorithm and (2) hardwired circuitry designed to execute said decode algorithm, said decoder designed to use said decode algorithm for decoding additional information from the encoded content using at least one of the plurality of keys, wherein the key is derived from the encoding process;
wherein the additional information includes an encode hash of at least a portion of the content and further comprising a generator for generating a decode hash of at least a portion of the content and a comparator for comparing said encode hash to said decode hash. - View Dependent Claims (68, 69, 70, 71, 72, 73, 74, 75, 76, 77)
- a receiver for receiving encoded content, wherein encoding of said encoded content comprises a steganographic mapping process that uses at least one of a plurality of keys; and
-
78. A system for identifying content, the system comprising:
- a receiver for receiving encoded content, wherein encoding of the encoded content comprises a steganographic mapping process that uses at least one of a plurality of keys; and
a decoder, said decoder comprising at least one of(1) a CPU and non transitory memory storing a decode algorithm and () hardwired circuitry designed to execute said decode algorithm, said decoder designed to use said decode algorithm for decoding additional information from the encoded content using at least one of the plurality of keys, wherein the key is derived from the encoding process;
wherein the additional information includes a watermark comprising a one way function of at least a portion of the content that contains the watermark, wherein the one way function is generated by a generator, said one way function configured to be insensitive to the encoding of the additional information;
further comprising a generator for generating a one way function selected from the following group consisting of;
a hash, a signature, a message digest and a certificate.
- a receiver for receiving encoded content, wherein encoding of the encoded content comprises a steganographic mapping process that uses at least one of a plurality of keys; and
-
79. A system for encoding additional information into content, the system comprising:
-
a receiver for receiving content to be encoded; and an encoder, said encoder comprising at least one of (1) a CPU and non transitory memory storing an encode algorithm and (2) hardwired circuitry designed to execute said encode algorithm, said encoder designed to use said encode algorithm for encoding the additional information into the content, wherein the encoding comprises a steganographic cipher process that uses at least one of a plurality of keys to generate at least one unique encoded copy of the content, and wherein the encoded additional information is unique to the encoded copy; wherein the additional information includes an encode hash of at least a portion of the content and further comprising a generator for generating a decode hash of at least a portion of the content and comparing said encode hash to said decode hash. - View Dependent Claims (80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95)
-
-
96. A system for encoding additional information into content, the system comprising:
-
a receiver for receiving content to be encoded; and an encoder, said encoder comprising at least one of (1) a CPU and non transitory memory storing an encode algorithm and (2) hardwired circuitry designed to execute said encode algorithm, said encoder designed to use said encode algorithm for encoding the additional information into the content, wherein the encoding comprises a steganographic cipher process that uses at least one of a plurality of keys to generate at least one unique encoded copy of the content, and wherein the encoded additional information is unique to the encoded copy; wherein the additional information includes a watermark comprising a one way function of at least a portion of the content that contains the watermark, wherein the one way function is generated by a generator, said one way function configured to be insensitive to the encoding of the additional information; further comprising a generator for generating a one way function selected from the following group consisting of;
a hash, a signature, a message digest and a certificate. - View Dependent Claims (97)
-
-
98. A system for tamper proofing content, the system comprising:
-
a processor for calculating a one way function of additional information, the information comprising data to be encoded into the content and information based on the content, such that the one way function is insensitive to the changes introduced into the content by the encoding process; and an encoder, said encoder comprising at least one of (1) a CPU and non transitory memory storing an encode algorithm and (2) hardwired circuitry designed to execute said encode algorithm, said encoder designed to use said encode algorithm for encoding the additional information into the content using a mapping function that selects one or more keys from a plurality of predetermined keys, and wherein the selected key comprises information derived from the encoding process. - View Dependent Claims (99)
-
Specification