Abstract:
A three-dimensional imaging system providing certification over a distributed network. By monitoring or controlling image capture from a trusted environment, the fidelity of the record of the image captured is certified by the operator of the trusted environment. An image record may be archived and an audit trail maintained for any image of interest.
Abstract:
A system for authenticating digital data capable of preventing change or disguise of data by improvement or interchange in case of no confidentiality in the data itself so as to maintain the data. When writing digital data from an input device to a memory and transferring the digital data from the memory to a receiving device, device authentication is performed between the input device and the memory and between the memory and the receiving device respectively. At the same time, when writing digital data to the memory, in the case of implementing on the digital data an electronic signature by a one-way hash function and also reading from the memory and transferring the digital data, the implemented electronic signature is decrypted so as to transfer the digital data after ensuring that it has not been changed since it was recorded. Thus, it is possible to prevent change or disguise of data by improvement or interchange in case of no confidentiality in the data itself so as to maintain the data.
Abstract:
Residue calculating sections respectively obtain residues which take a plurality of integers as modulus, with respect to a user ID. The plurality of integers are stored in modulus storage sections and are prime to each other. Based on these residues and parameters stored in a coding parameter storage section, component codes constructed by continuous sequences of 1 and 0 using a predetermined number of bits as a unit are respectively generated by component code generating sections. These component codes are concatenated by a concatenating section, thereby to obtain a code to be embedded, which constructs watermark information.
Abstract:
A three-dimensional imaging system providing certification over a distributed network. By monitoring or controlling image capture from a trusted environment, the fidelity of the record of the image captured is certified by the operator of the trusted environment. An image record may be archived and an audit trail maintained for any image of interest.
Abstract:
An implementation of a technology is described herein that facilitates rights enforcement of digital goods using watermarks. More particularly, it is a fingerprinting technology for protecting digital goods by detecting collusion as a malicious attack and identifying the participating colluders. If a digital pirate breaks one client and enables this client to avoid watermark detection, all content (both marked/protected an unmarked/free) can be played as unmarked only on that particular client. However, to enable other clients to play content as unmarked, the digital pirate needs to collude the extracted detection keys from many clients in order to create content that can evade watermark detection on all clients. The described implementation significantly improves collusion resistance through a fingerprinting mechanism that can identify the members of a malicious coalition even when their numbers are several orders of magnitude greater than what conventional collusion-protection schemes can accomplish. However, in this scenario each member of the malicious coalition leaves a fingerprint in every digital good from which the estimated watermark is subtracted. [DKI]Thus, like a burglar without gloves, the digital pirate leaves her fingerprints only when she commits a crime. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
Abstract:
The target of stereoscopic processing for creating a stereoscopic image from an original image is restricted to specific original images. An authentication image creation device changes the pixel data of a target pixel within an original image into update data that are created from the pixel data of pixels adjacent to that target pixel. On the other hand, in advance of stereoscopic processing of the original image, an image processing device compares the pixel data of the target pixel in that original image with authentication data that are created from the pixel data of pixels adjacent to that that target pixel, and based on the results of that comparison, determines whether or not stereoscopic processing of that original image is to be permitted.
Abstract:
A data-processing system and method for controlling synthesizing digital-signature information. The system and method include holding first private-key information, inputting second private-key information, generating third private-key information based on the first private-key information and the second private-key information, holding the third private-key information, generating signature information based on information to be verified and the third private-key information, and outputting the information to be verified and the signature information.
Abstract:
A multi-stage watermarking system and process that creates a watermark specification which describes how to generate a watermark, generates a template specification which describes how to merge the watermark into a target document, generates the watermark based on the watermark specification, and merges the watermark into the target document based on the template specification to provide a watermarked document.
Abstract:
Method and apparatus for generating a hash signal representative of a multimedia signal are described. The method includes receiving a bit-stream comprising a compressed multimedia signal, selectively reading from the bit-stream predetermined parameters, and deriving a hash function from the parameters.
Abstract:
This invention provides a method for identifying a purchaser who purchased content from which an illegal copy was produced. A provider system encrypts a content purchased by the purchaser using a public key of a purchaser system and sends the encrypted content to the purchaser system. The purchaser system creates a digital signature of the content with the use of a private key of its own and embeds the created digital signature into the received content. When an illegal copy is found, the provider system verifies the digital signature, embedded in the illegal copy as a digital watermark, to identify the purchaser who purchased the content from which the illegal copy was produced.