Security based on subliminal and supraliminal channels for data objects
First Claim
1. A method of protecting a data object comprising:
- determining a set of candidate bits in a digitized sample stream;
steganographically encoding a subset of bits of said set of candidate bits, so that values of bits of said subset are changed by an amount below a perceptibility threshold;
perceptibly manipulating data in the digitized sample stream by changing the value of at least one bit of said set of candidate bits that is not a bit in said subset, by more than a perceptibility threshold;
whereby said steganographically encoding and said perceptibly manipulating results in a secure/unique digital sample stream.
2 Assignments
0 Petitions
Accused Products
Abstract
This invention relates to security for data objects; more particularly, the present invention relates to improved security based on subliminal and supraliminal channels for data objects. In another embodiment, a method of protecting a data object comprises: steganographically encoding a subset of candidate bits in a digitized sample stream; perceptibly manipulating data in the digitized sample stream; and combining the imperceptible and perceptible data changes to create a secure/unique digital sample stream. In yet another embodiment, a method for securing a data signal comprises: preanalyzing said data signal for candidate watermark/signature bits; steganographically encoding independent data into the data signal into a subset of the candidate watermark bits, at least one time; and encoding the data signal subsequently with a perceptible technique.
410 Citations
30 Claims
-
1. A method of protecting a data object comprising:
-
determining a set of candidate bits in a digitized sample stream; steganographically encoding a subset of bits of said set of candidate bits, so that values of bits of said subset are changed by an amount below a perceptibility threshold; perceptibly manipulating data in the digitized sample stream by changing the value of at least one bit of said set of candidate bits that is not a bit in said subset, by more than a perceptibility threshold; whereby said steganographically encoding and said perceptibly manipulating results in a secure/unique digital sample stream. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for securing a data signal comprising:
-
preanalyzing said data signal for a set of candidate watermark/signature bits; steganographically encoding independent data into the data signal into a subset of the set of candidate watermark/signature bits, at least one time; and encoding the data signal subsequently with a perceptible technique by changing at least one of the set of candidate watermark bits not in said subset. - View Dependent Claims (13, 14)
-
-
15. A method of protecting a data signal comprising:
-
imperceptibly embedding data using a watermarking technique that uses a private key, thereby providing embedded data; perceptibly signing the embedded data using a receiver'"'"'s public key, thereby providing signed embedded data; encrypting the signed embedded data using the receiver'"'"'s public key and the said private key, thereby providing embedded signed encrypted data; and transmitting a data signal comprising said embedded signed encrypted data.
-
-
16. A method for securing a data signal comprising:
-
preanalyzing said data signal for a set of candidate watermark/signature bits; steganographically encoding independent data into the data signal into a subset of the set of candidate watermark/signature bits, at least one time; and subsequently steganographically encoding the remainder of said subset of bits. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method for protecting a data signal comprising:
-
using a predetermined key to imperceptibly encode a data stream with a first set of independent data; providing a housing to house said data stream; and placing on the housing a perceptible machine-readable unique identifier that has a logical relationship to said independent data.
-
-
26. A device for securing a data signal said device comprising:
-
a receiver for receiving the data signal; an analyzer to analyze said data signal for a set of candidate watermark bits; wherein said set of candidate watermark bits consists of a subset and a remainder; an encoder for steganographically encoding independent data into the data signal into said subset of the set of candidate watermark bits, at least one time; and an encoder for steganographically encoding the remainder of said candidate watermark bits. - View Dependent Claims (27, 28, 29, 30)
-
Specification