Abstract:
An intra-block of the I-frame or P,B-frame is detected from an MPEG stream. When it is detected, one macro block of data is taken out from the MPEG stream and buffered. The buffered macro block is embedded with a pattern so that the length of the VLC may be invariant. The macro block embedded with a pattern is returned back to the MPEG stream. More specifically, the DC component is detected from the buffered macro block and a pseudo-random number is generated in order to generate a pattern to be embedded. It is judged whether or not the bit length of the DC component is invariant when the generated pattern is embedded. If the bit length is invariant, the pattern is embedded in the buffered macro block. When the bit length is varied, it is judged whether or not half of the pattern can be embedded. If possible, the pattern is embedded.
Abstract:
An intra-block of the I-frame or P,B-frame is detected from an MPEG stream. When it is detected, one macro block of data is taken out from the MPEG stream and buffered. The buffered macro block is embedded with a pattern so that the length of the VLC may be invariant. The macro block embedded with a pattern is returned back to the MPEG stream. More specifically, the DC component is detected from the buffered macro block and a pseudo-random number is generated in order to generate a pattern to be embedded. It is judged whether or not the bit length of the DC component is invariant when the generated pattern is embedded. If the bit length is invariant, the pattern is embedded in the buffered macro block. When the bit length is varied, it is judged whether or not half of the pattern can be embedded. If possible, the pattern is embedded.
Abstract:
A data hiding method for hiding message data in media data and a data extracting method for extracting message data hidden in the media data. In the data hiding method, the message data are dispersedly hidden in the media data so that no third person can alter the message data. Specifically, the array elements of a message array are dispersedly hidden in a media array based on a status value S designating a specific array element in the media array when the media data and message data are expressed as the media array and the message array, respectively. The hiding method includes (a) a step of determining the j-th (j>/=0) status value Sj, (b) a step of determining the (j+1)-th status value Sj+1 based on the value Sj, the array element of the media array designated by the value Sj and the above-mentioned array element of the message array, and (c) a step of hiding data to be hidden in the array element of the media array designated by the value Sj+1.
Abstract:
A data hiding method for hiding message data in media data and a data extracting method for extracting message data hidden in the media data. In the data hiding method, the message data are dispersedly hidden in the media data so that no third person can alter the message data. Specifically, the array elements of a message array are dispersedly hidden in a media array based on a status value S designating a specific array element in the media array when the media data and message data are expressed as the media array and the message array, respectively. The hiding method includes (a) a step of determining the j-th (j≥0) status value Sj, (b) a step of determining the (j+1)-th status value Sj+1 based on the value Sj, the array element of the media array designated by the value Sj and the above-mentioned array element of the message array, and (c) a step of hiding data to be hidden in the array element of the media array designated by the value Sj+1.
Abstract:
Simulation of a system with a plurality of ECU is rapidly executed while avoiding deadlock by performing conservative event synchronization. A simulation system is provided with 4 layers, namely a processor emulator which is an ECU emulator, a plant simulator, and external peripheral scheduler, and a mutual peripheral scheduler. The external peripheral scheduler performs advanced execution of the plant simulator only during processor emulator reaction delay time (or the time until the next event). Furthermore, notification to perform advanced execution of the processor emulator is provided until the actual plant simulator stop time. The mutual peripheral scheduler provides notification to the processor emulator to perform advanced execution only during communication delay timing between processor emulators (or the time until the next event). The processor emulator conservatively processes until the earliest time of the notification times. Each peripheral proceeds with processing until the earliest time of the accepted events.
Abstract:
A digital content delivery system, a digital content delivery method, a program for executing the method, a computer-readable recording medium storing thereon the program, and a server and a client for it. The digital content delivery system delivers a digital content via a first network (12) and a second network (22). A server (14) is connected to the first network (12), and clients (20) each of which receives a digital content and displays or reproduces it are connected to the second network (22). The server (14) divides a digital content it has into a plurality of packets and sends the packets, which are minimum units for configuring the digital content, to the second network (22). Each of the clients (20) includes means for allowing the client (20) to hold a digital content using the packets, which are minimum units, received by the client (20) from the server (14) and the packets received from another client of the second network.
Abstract:
A data hiding method for embedding message data into media data comprising the steps of obtaining a secondary key by inputting a key having a predetermined value to a specified function; determining hiding positions in which the message data will be embedded according to the obtained secondary key, and selecting one of plural hiding functions according to the secondary key so that the selected hiding function is used for each of the determined hiding positions; and embedding the message data into each of the determined hiding positions according to the selected hiding function corresponding to the hiding position.
Abstract:
A digital camera has means to authentication information into a photographed image for detecting the identity of the image. The authentication information supplied integrally with the image data, so that, the verifier can verify the image data without saving the authentication information. This is achieved by having a region dividing unit 24 for dividing the image into a first image region and a second image region in response to the digital signal, authentication information generating means 29 for generating authentication information from data in the first image region, encrypting means 30 for encrypting the authentication information, hiding means 25 for embedding the encrypted authentication information into the second image region by operating the data in the second image region, and region combining means 26 for combining the first image region in the image with the second image region in which the authentication information is embedded.