Abstract:
An intra-block of the I-frame or P,B-frame is detected from an MPEG stream. When it is detected, one macro block of data is taken out from the MPEG stream and buffered. The buffered macro block is embedded with a pattern so that the length of the VLC may be invariant. The macro block embedded with a pattern is returned back to the MPEG stream. More specifically, the DC component is detected from the buffered macro block and a pseudo-random number is generated in order to generate a pattern to be embedded. It is judged whether or not the bit length of the DC component is invariant when the generated pattern is embedded. If the bit length is invariant, the pattern is embedded in the buffered macro block. When the bit length is varied, it is judged whether or not half of the pattern can be embedded. If possible, the pattern is embedded.
Abstract:
An intra-block of the I-frame or P,B-frame is detected from an MPEG stream. When it is detected, one macro block of data is taken out from the MPEG stream and buffered. The buffered macro block is embedded with a pattern so that the length of the VLC may be invariant. The macro block embedded with a pattern is returned back to the MPEG stream. More specifically, the DC component is detected from the buffered macro block and a pseudo-random number is generated in order to generate a pattern to be embedded. It is judged whether or not the bit length of the DC component is invariant when the generated pattern is embedded. If the bit length is invariant, the pattern is embedded in the buffered macro block. When the bit length is varied, it is judged whether or not half of the pattern can be embedded. If possible, the pattern is embedded.
Abstract:
It is one object of the present invention to provide a method and system for embedding an electronic watermark directly in an MPEG stream. ÄConstitutionÜ An intra-macroblock of an I-frame or of a P or B-frame is detected in an MPEG stream, and following the detection of an intra-macroblock of the I-frame or of the P or B-frame, data for one macroblock are extracted from the MPEG stream and buffered. An embedding pattern is embedded in the buffered macroblock without changing the length of VLC, and the resultant macroblock is returned to the MPEG stream. More specifically, a DC factor is extracted from the buffered macroblock, and a pseudorandom number is generated to produce an embedding pattern. Then, whether the bit length of the DC factor will not be changed by embedding the obtained embedded pattern is determined. When the bit length of the DC factor not be changed, the embedding pattern is embedded in the buffered macroblock. When the bit length will be changed, whether 1/2 of the embedding pattern can be embedded is determined. If possible, 1/2 of the embedded pattern is embedded in the macroblock.
Abstract:
It is one object of the present invention to provide a method and system for embedding an electronic watermark directly in an MPEG stream. ÄConstitutionÜ An intra-macroblock of an I-frame or of a P or B-frame is detected in an MPEG stream, and following the detection of an intra-macroblock of the I-frame or of the P or B-frame, data for one macroblock are extracted from the MPEG stream and buffered. An embedding pattern is embedded in the buffered macroblock without changing the length of VLC, and the resultant macroblock is returned to the MPEG stream. More specifically, a DC factor is extracted from the buffered macroblock, and a pseudorandom number is generated to produce an embedding pattern. Then, whether the bit length of the DC factor will not be changed by embedding the obtained embedded pattern is determined. When the bit length of the DC factor not be changed, the embedding pattern is embedded in the buffered macroblock. When the bit length will be changed, whether 1/2 of the embedding pattern can be embedded is determined. If possible, 1/2 of the embedded pattern is embedded in the macroblock.
Abstract:
It is one object of the present invention to provide a method and system for embedding an electronic watermark directly in an MPEG stream. ÄConstitutionÜ An intra-macroblock of an I-frame or of a P or B-frame is detected in an MPEG stream, and following the detection of an intra-macroblock of the I-frame or of the P or B-frame, data for one macroblock are extracted from the MPEG stream and buffered. An embedding pattern is embedded in the buffered macroblock without changing the length of VLC, and the resultant macroblock is returned to the MPEG stream. More specifically, a DC factor is extracted from the buffered macroblock, and a pseudorandom number is generated to produce an embedding pattern. Then, whether the bit length of the DC factor will not be changed by embedding the obtained embedded pattern is determined. When the bit length of the DC factor not be changed, the embedding pattern is embedded in the buffered macroblock. When the bit length will be changed, whether 1/2 of the embedding pattern can be embedded is determined. If possible, 1/2 of the embedded pattern is embedded in the macroblock.
Abstract:
PROBLEM TO BE SOLVED: To properly provide a view in accordance with access permission when data is linked between domains.SOLUTION: A domain data owner groups the same recipients in accordance with the hierarchy of data, encrypts a group of leaves using a common key, and replaces the encrypted group with an element of a name. The common key of all the groups is encrypted using a public key of the recipients to make public data M. A link creator decrypts each group using the common key, generates a table for each group on the basis of a link, and propagates each record of the table to a parent. The table is encrypted using the common key, and the entire data obtained is encrypted using the common key. The common key is encrypted using the public key of the recipients of the link to make public data N. A referrer obtains the common key by decrypting the data N and the data M using a secret key, to decrypt domain data and link data. Here, each record of the table is propagated to a child, and those having the same link names are replaced by the records of the child.
Abstract:
PROBLEM TO BE SOLVED: To transfer authority of encryption communication without increasing leakage risk of an encryption key. SOLUTION: A system with a first communication apparatus and a management apparatus which makes encryption communications perform between the first communication apparatus and an external second communication apparatus, is offered. The management apparatus is provided with: a key memory unit which memorizes a first encryption key which is shared with the second communication apparatus; a key creation unit which performs operation which gives the first encryption key which is read out from the key memory unit to one direction function with a key, and creates the operation result as the second encryption key; and a key output unit which outputs the second encryption key and the key of the one direction function to the first communication apparatus. The first communication apparatus is provided with a key creation control unit which transmits the key of the one direction function received from the management apparatus to the second communication apparatus, makes the second communication apparatus perform operation to give the memorized first encryption key to the one direction function with the key, and creates the second encryption key; and an encryption communication unit which performs encryption communications with the second communication apparatus using the second encryption key received from the management apparatus. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To reduce the message length of an encryption message selectively transmitted to a plurality of decoding apparatuses. SOLUTION: In an encryption communication system, an encryption apparatus includes a node-associated information generator for generating node-associated information for associating each end node in a tree structure with each decoding apparatus according to the group of the decoding apparatuses which permit decoding, a node extraction part for extracting a decoding permission node which has the decoding apparatus for allowing the decoding as the end node of a descendant and which does not have the decoding apparatus for inhibiting decoding even in any end node of the descendant, and a message encryption unit for encrypting the message by the node encryption key of the decoding permission node. Each decoding apparatus includes an end node specifier for specifying the end node associated with the decoding apparatus based on the node-associated information, and a message decoding unit for decoding the encryption message by the node decoding key of any decoding permission node from the end node to a route node. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To properly manage the content of information registered in a user community. SOLUTION: To provide a system for managing a user community provided on an information processing system for allowing the other users refer to information provided by a user. This system is provided with a storage part for storing an audit policy for specifying the content of information for permitting registration in the user community in association with each of a plurality of user communities; a detection part for detecting the user community of a provision destination according to the provision of information by the user; and a registration control part for preventing the information from being registered in the user community under such conditions that the information provided by the user is against the audit policy corresponding to the detected user community. COPYRIGHT: (C)2007,JPO&INPIT