Security based on subliminal and supraliminal channels for data objects
First Claim
1. A computer-based method for securing a data signal having a signal containing bits that are suitable for manipulation and bits that are not suitable for manipulation, the method comprising:
- analyzing a plurality of candidate watermark bits to identify the bits that are suitable for bit manipulation;
selecting a subset of the plurality of candidate watermark bits identified as suitable for manipulation;
manipulating the subset of the plurality of candidate watermark bits; and
associating the manipulated subset of the plurality of candidate watermark bits with the identified plurality of candidate watermark bits.
2 Assignments
0 Petitions
Accused Products
Abstract
This invention relates to security for data objects; more particularly, the present invention relates to improved security based on subliminal and supraliminal channels for data objects. In another embodiment, a method of protecting a data object comprises: steganographically encoding a subset of candidate bits in a digitized sample stream; perceptibly manipulating data in the digitized sample stream; and combining the imperceptible and perceptible data changes to create a secure/unique digital sample stream. In yet another embodiment, a method for securing a data signal comprises: preanalyzing said data signal for candidate watermark/signature bits; steganographically encoding independent data into the data signal into a subset of the candidate watermark bits, at least one time; and encoding the data signal subsequently with a perceptible technique.
395 Citations
13 Claims
-
1. A computer-based method for securing a data signal having a signal containing bits that are suitable for manipulation and bits that are not suitable for manipulation, the method comprising:
-
analyzing a plurality of candidate watermark bits to identify the bits that are suitable for bit manipulation; selecting a subset of the plurality of candidate watermark bits identified as suitable for manipulation; manipulating the subset of the plurality of candidate watermark bits; and associating the manipulated subset of the plurality of candidate watermark bits with the identified plurality of candidate watermark bits. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-based method for securing a steganographically encoded data signal having a signal containing bits that are suitable for manipulation and bits that are not suitable for manipulation, the method comprising:
-
analyzing a plurality of watermark bits in a steganographically encoded data signal to identify the bits that are suitable for bit manipulation; selecting at least one subset of the identified plurality of watermark bits identified as suitable for manipulation; manipulating at least one subset of the plurality of watermark bits; and associating the manipulated subset of the plurality of watermark bits with the original unencoded data signal. - View Dependent Claims (9, 10, 11, 12, 13)
-
Specification