Abstract:
A data hiding method for hiding message data in media data and a data extracting method for extracting message data hidden in the media data. In the data hiding method, the message data are dispersedly hidden in the media data so that no third person can alter the message data. Specifically, the array elements of a message array are dispersedly hidden in a media array based on a status value S designating a specific array element in the media array when the media data and message data are expressed as the media array and the message array, respectively. The hiding method includes (a) a step of determining the j-th (j>/=0) status value Sj, (b) a step of determining the (j+1)-th status value Sj+1 based on the value Sj, the array element of the media array designated by the value Sj and the above-mentioned array element of the message array, and (c) a step of hiding data to be hidden in the array element of the media array designated by the value Sj+1.
Abstract:
PROBLEM TO BE SOLVED: To suppress the degradation in picture quality or the like of media information subjected to padding processing by properly certifying who is a true owner and adaptively determining the manipulated variable for characteristic values such as picture element values. SOLUTION: In a data hiding method which pads media data with message data, a key having a prescribed value is taken as input of a specific function to obtain a secondary key. Based on this obtained secondary key, the padding position of message data is specified, and a function for padding to be used in this specified position out of plural functions for padding is specified. The padding processing of message data is performed in the specified position based on the specified function for padding.
Abstract:
PROBLEM TO BE SOLVED: To provide high durability against elimination or change of hidden message information by hiding medium information into message information in a frequency space and to keep hidden message information effectively even when signal processing using a frequency filter is executed. SOLUTION: In order to hide message information (m) in medium information M, these information are frequency-converted to obtain those frequency spectra f1 , f2 . Then an area including a characteristic frequency component denoting a characteristic of the message information (m) in a real space is extracted from the frequency spectrum f2 of the message information (m) as a basic area B. Regarding the basic area B, n-sets of copies are generated and n-sets of the copies are arranged dispersedly in the frequency space and the other frequency components are set to zero to generate a frequency spectrum f3 as intermediate information. Finally the frequency spectrum f3 and the frequency spectrum f1 are added and the result is frequency-converted inversely to hide the message information (m) into the medium information M.
Abstract:
PROBLEM TO BE SOLVED: To provide a new system capable of supplying authentication information in a form which is inseparable from an image data. SOLUTION: An image is halved and authentication information to hide in one image is obtained from the other image itself. Objective image data photographed by a digital camera is divided into an area D1 for generating a hush value and an area D2 for hiding a hush value H. A digest-calculating part calculates H from data of D1 and ciphers it by a secret key different for each digital camera, etc., to hide D2 , hiding can be executed by operating a pixel value in a real space or a frequency space to a degree of not being recognized visually. In D2 , additional information such as a time stamp, positional information of GPS can be hidden before hiding data from D1 .
Abstract:
An intra-block of the I-frame or P,B-frame is detected from an MPEG stream. When it is detected, one macro block of data is taken out from the MPEG stream and buffered. The buffered macro block is embedded with a pattern so that the length of the VLC may be invariant. The macro block embedded with a pattern is returned back to the MPEG stream. More specifically, the DC component is detected from the buffered macro block and a pseudo-random number is generated in order to generate a pattern to be embedded. It is judged whether or not the bit length of the DC component is invariant when the generated pattern is embedded. If the bit length is invariant, the pattern is embedded in the buffered macro block. When the bit length is varied, it is judged whether or not half of the pattern can be embedded. If possible, the pattern is embedded.
Abstract:
A data hiding method for hiding message data in media data and a data extracting method for extracting message data hidden in the media data. In the data hiding method, the message data are dispersedly hidden in the media data so that no third person can alter the message data. Specifically, the array elements of a message array are dispersedly hidden in a media array based on a status value S designating a specific array element in the media array when the media data and message data are expressed as the media array and the message array, respectively. The hiding method includes (a) a step of determining the j-th (j≥0) status value Sj, (b) a step of determining the (j+1)-th status value Sj+1 based on the value Sj, the array element of the media array designated by the value Sj and the above-mentioned array element of the message array, and (c) a step of hiding data to be hidden in the array element of the media array designated by the value Sj+1.
Abstract:
A method of hiding message information in media information in a frequency space. A high resistance to removal and alteration of hidden message is given. Even when signal processing is executed by using a frequency filter, the hidden message information is continuously maintained effectively. The frequency spectra (f1 and f2) of the medium information (M) and message information (m) are found by frequency-converting the information (m) and the information (M) in order to hide the message information (m) in media information (M). Then an area containing a characteristic frequency component indicating the feature of the message information (m) in a real space is extracted from the frequency spectrum (f2) of the message information (m) as a basic area (B). Then a frequency spectrum (f3) is generated as intermediate information by making n copies of the basic area (B), dispersedly arranging the copies in the frequency space and making the other frequency components zero. Lastly, the message information (m) is hidden in the medium information (M) by executing operation based on the frequency spectrum (f3) and medium information (M).
Abstract:
An intra-block of the I-frame or P,B-frame is detected from an MPEG stream. When it is detected, one macro block of data is taken out from the MPEG stream and buffered. The buffered macro block is embedded with a pattern so that the length of the VLC may be invariant. The macro block embedded with a pattern is returned back to the MPEG stream. More specifically, the DC component is detected from the buffered macro block and a pseudo-random number is generated in order to generate a pattern to be embedded. It is judged whether or not the bit length of the DC component is invariant when the generated pattern is embedded. If the bit length is invariant, the pattern is embedded in the buffered macro block. When the bit length is varied, it is judged whether or not half of the pattern can be embedded. If possible, the pattern is embedded.
Abstract:
PROBLEM TO BE SOLVED: To discriminate whether alteration is added to any part of a picture by embedding an electronic watermark to the picture. SOLUTION: Relating to an embedding part 30, DCT blocks of the luminance components Y of a picture are paired two by two, mutually corresponding DCT coefficients are randomly selected from respective DCT blocks included in each pair through the use of a random number, and data are embedded by operating so that a mutual relation between these DCT coefficients may express data in accordance with a prescribed rule. When this picture is altered, the DCT coefficients included in the pair of the altered part is no longer subjected to the rule but express a value different from original data. A sampling part 40 samples data from the picture, estimates data embedded first by majority, discriminates that a pair from which data different from the estimated data is altered, and displays it.