Steganographic method and device
First Claim
1. A computer-based method for identifying, from content, additional information defining or describing a message encoded in said content, the method comprising:
- receiving, in a machine, said content having said additional information encoded therein;
decoding, with said machine, said message from said content using at least one of a plurality of keys.
3 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and method for encoding and decoding additional information into a stream of digitized samples in an integral manner. The information is encoded using special keys. The information is contained in the samples, not prepended or appended to the sample stream. The method makes it extremely difficult to find the information in the samples if the proper keys are not possessed by the decoder. The method does not cause a significant degradation to the sample stream. The method is used to establish ownership of copyrighted digital multimedia content and provide a disincentive to piracy of such material.
394 Citations
54 Claims
-
1. A computer-based method for identifying, from content, additional information defining or describing a message encoded in said content, the method comprising:
-
receiving, in a machine, said content having said additional information encoded therein; decoding, with said machine, said message from said content using at least one of a plurality of keys. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A machine implemented method for identifying, in content containing additional information defining or describing a message, said message, comprising:
-
receiving, in said machine, said content, wherein said content contains encoded therein additional information defining or describing said message; performing, with said machine, a transform on a first subset of said content, said first subset at a first location in said content, wherein said first subset does not include all of said content, to obtain a transformed first subset; comparing, with said machine, said transformed first subset with a start of message marker, thereby determining whether said first location identifies a start of message marker location; and decoding, with said machine, using said start of message marker location, said message. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A method for identifying, in content, a message, comprising:
-
receiving, in said machine, said content, wherein said content contains encoded therein additional information defining or describing a message; comparing, in said machine, a first subset of said content at a first location in said content, wherein said first subset does not include all of said content, with a start of message marker, thereby determining whether said first location identifies said start of message marker location; in response to said machine determining that said first location identifies said start of message marker location, executing an additional information identification algorithm to identify said additional information by using said start of message marker location to determine where in said content to begin examining said content for said additional information; and decoding said message from said content using said machine and said start of message marker location. - View Dependent Claims (28, 29, 30, 31, 32)
-
-
33. A method for identifying content with a machine configured to use a steganographic cipher process, said process using a steganographic technique of hiding additional information including a watermark in combination with a cryptographic technique of multiple keys, comprising the steps of:
-
said machine receiving content that has been steganographically encoded with additional information defining or describing a message for identifying the content, wherein the encoding is controlled using at least one of the multiple keys; said machine acquiring at least one of the multiple keys to be used for decoding; said machine using the steganographic cipher process to locate the additional information defining or describing said message by using the at least one of the acquired keys; said machine using the steganographic cipher process to extract said message. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. A machine for identifying, from content containing additional information, a message defined or described in said additional information, the machine comprising:
-
a receiver configured to receive in said machine, said content; a memory configured to store said content; a decoder configured to decode said message from said additional information in said content stored in said memory using at least one of a plurality of keys.
-
-
44. A machine for identifying, in content, a message, using a start of message marker location, comprising:
-
a receiver configured to receive in said machine, said content, wherein said content contains therein additional information defining or describing said message; memory configured to store said content; a transformer configured to transform a first subset of said content stored in said memory, said first subset at a first location in said content, wherein said first subset does not include all of said content, to obtain a transformed first subset; a comparator configured to compare said transformed first subset with said start of message marker, thereby determining whether said first location identifies said start of message marker location; and a decoder configured to decode said message using said start of message marker location. - View Dependent Claims (45, 46, 48, 49)
-
-
47. A machine for decoding a message defined or described in additional information of content, comprising:
-
a receiver configured to receive said content; memory configured to store said content; a comparator configured to compare a first subset of said content at a first location in said content, wherein said first subset does not include all of said content, with a start of message marker, thereby determining whether said first location identifies said start of message marker location; an executor configured to, in response to said machine determining that said first location identify said start of message marker location, execute an additional information identification algorithm to identify said additional information by using said start of message marker location to determine where in said content to begin examining said content for said additional information; and a decoder configured to decode said message from said content.
-
-
50. A machine for determining a message encoded in content with a steganographic cipher process, comprising:
-
a receiver configured to receive content that has been steganographically encoded with a message using at least one of multiple keys; structure configured to acquire at least one of the multiple keys; memory configured to store said content and said at least one of the multiple keys; a locator configured to locate, using the steganographic cipher process, the additional information by using the at least one of the acquired keys; an extractor configured to, using the steganographic cipher process, extract the message from the content; and a decoder configured to decode said message. - View Dependent Claims (51, 52)
-
-
53. A method for identifying content, comprising the steps of:
-
receiving encoded content that has been encoded using a mapping and at least one of multiple keys, with additional information defining or describing a message that identifies the content; acquiring at least one of the multiple keys; using the mapping and at least one of the acquired keys to locate in the encoded content the additional information; and extracting said message from the located additional information.
-
-
54. A machine for identifying content, comprising:
-
a receiver designed to receive encoded content that has been encoded, using a mapping and at least one of multiple keys, with a message that identifies the content; structure designed to acquire at least one of the multiple keys; a locator configured to locate, using the mapping and at least one of the acquired keys, location in the encoded content of the message; and an extractor designed to extract said message from the encoded content.
-
Specification