Indigenous authentication for sensor-recorders and other information capture devices
    82.
    发明申请
    Indigenous authentication for sensor-recorders and other information capture devices 审中-公开
    传感器记录仪和其他信息捕获设备的本地认证

    公开(公告)号:US20050132200A1

    公开(公告)日:2005-06-16

    申请号:US10876318

    申请日:2004-06-24

    Abstract: A method and system of authentication for sensor-recorders and other information capture devices is disclosed. In accordance with aspects of the current invention, a digital sample of the environment is obtained. From this sample and at least one parameter representative of at least one condition under which the sample was generated, a digital signature is created. This signature is stored in memory with the sample to be checked at a later time for authenticity. The file is checked for authenticity by generating a second signature from the file and comparing that signature to the original signature. If the two signatures are identical, the sample is considered authentic and if the two signatures are different, the sample cannot be authenticated.

    Abstract translation: 公开了用于传感器记录器和其他信息捕获装置的认证方法和系统。 根据本发明的方面,获得环境的数字样本。 从该样本和表示生成样本的至少一个条件的至少一个参数,创建数字签名。 该签名存储在存储器中,样品将在稍后的时间内进行真实性验证。 通过从文件生成第二个签名并将该签名与原始签名进行比较来检查文件的真实性。 如果两个签名是相同的,则该样本被认为是可信的,如果两个签名不同,则该样本不能被认证。

    Context watermark for digital contents
    83.
    发明申请
    Context watermark for digital contents 审中-公开
    数字内容的上下文水印

    公开(公告)号:US20050129269A1

    公开(公告)日:2005-06-16

    申请号:US10732044

    申请日:2003-12-10

    Applicant: Jyh-Han Lin

    Inventor: Jyh-Han Lin

    Abstract: A method for context watermarking includes the steps of performing a Hash function “D” of the digital content (502). A Hash function “C” of the context information is also calculated (504). The Hash “D” is then appended to the context information (506) while the Hash “C” is appended to the digital content (508). The augmented content and context information are then packaged together (510) with the Hash values “D” and “C” helping to bind the content and context together. Instead of using Hash function other more sophisticated signatures can be used like those produced using Discrete Wavelet Transforms (DWT) or fractal-based transforms. An electronic device such as a radio communication device (700) capable of performing context watermarking is also described.

    Abstract translation: 一种用于上下文水印的方法包括执行数字内容(502)的散列函数“D”的步骤。 还计算上下文信息的散列函数“C”(504)。 然后将哈希“D”附加到上下文信息(506),而哈希“C”附加到数字内容(508)。 然后将增强的内容和上下文信息打包在一起(510)与哈希值“D”和“C”有助于将内容和上下文结合在一起。 而不是使用哈希函数,可以使用其他更复杂的签名,就像使用离散小波变换(DWT)或基于分形的变换产生的那样。 还描述了能够执行上下文水印的诸如无线电通信设备(700)的电子设备。

    Collusion-resistant watermarking and fingerprinting
    84.
    发明申请
    Collusion-resistant watermarking and fingerprinting 有权
    防欺骗水印和指纹识别

    公开(公告)号:US20050086486A1

    公开(公告)日:2005-04-21

    申请号:US10975735

    申请日:2004-10-28

    Abstract: An implementation of a technology is described herein that facilitates rights enforcement of digital goods using watermarks. More particularly, it is a fingerprinting technology for protecting digital goods by detecting collusion as a malicious attack and identifying the participating colluders. If a digital pirate breaks one client and enables this client to avoid watermark detection, all content (both marked/protected an unmarked/free) can be played as unmarked only on that particular client. However, to enable other clients to play content as unmarked, the digital pirate needs to collude the extracted detection keys from many clients in order to create content that can evade watermark detection on all clients. The described implementation significantly improves collusion resistance through a fingerprinting mechanism that can identify the members of a malicious coalition even when their numbers are several orders of magnitude greater than what conventional collusion-protection schemes can accomplish. However, in this scenario each member of the malicious coalition leaves a fingerprint in every digital good from which the estimated watermark is subtracted. Thus, like a burglar without gloves, the digital pirate leaves her fingerprints only when she commits a crime. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.

    Abstract translation: 本文描述了一种使用水印来促进数字商品的权利实施的技术的实现。 更具体地说,它是通过检测串通作为恶意攻击并识别参与的共谋者来保护数字商品的指纹技术。 如果数字盗版打破了一个客户端,并且使得该客户端能够避免水印检测,则所有内容(无标记/免费标记/保护)只能在该特定客户端上被标记为无标记。 然而,为了使其他客户端能够以无标记的方式播放内容,数字盗版者需要从许多客户端中抽出提取的检测密钥,以创建可以避免所有客户端上的水印检测的内容。 所描述的实现通过指纹机制显着地提高了共谋阻力,该指纹机制可以识别恶意联盟的成员,即使它们的数量比常规串谋保护方案可以完成多几个数量级。 然而,在这种情况下,恶意联盟的每个成员在每个数字商品中留下指纹,从中减去估计的水印。 因此,像没有手套的防盗器一样,数字盗版者只有在犯罪时才会留下指纹。 本摘要本身并不旨在限制本专利的范围。 在所附权利要求中指出了本发明的范围。

    Collusion-resistant watermarking and fingerprinting

    公开(公告)号:US20050060550A1

    公开(公告)日:2005-03-17

    申请号:US10975589

    申请日:2004-10-28

    Abstract: An implementation of a technology is described herein that facilitates rights enforcement of digital goods using watermarks. More particularly, it is a fingerprinting technology for protecting digital goods by detecting collusion as a malicious attack and identifying the participating colluders. If a digital pirate breaks one client and enables this client to avoid watermark detection, all content (both marked/protected an unmarked/free) can be played as unmarked only on that particular client. However, to enable other clients to play content as unmarked, the digital pirate needs to collude the extracted detection keys from many clients in order to create content that can evade watermark detection on all clients. The described implementation significantly improves collusion resistance through a fingerprinting mechanism that can identify the members of a malicious coalition even when their numbers are several orders of magnitude greater than what conventional collusion-protection schemes can accomplish. However, in this scenario each member of the malicious coalition leaves a fingerprint in every digital good from which the estimated watermark is subtracted. Thus, like a burglar without gloves, the digital pirate leaves her fingerprints only when she commits a crime. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.

    Watermark-based goods authentication
    86.
    发明申请
    Watermark-based goods authentication 有权
    基于水印的货物认证

    公开(公告)号:US20050036652A1

    公开(公告)日:2005-02-17

    申请号:US10641684

    申请日:2003-08-14

    Abstract: An implementation is described herein facilitates certification of goods and/or identifications of the source of such goods. At least one implementation, described herein, embeds a watermark into a relatively small amount of data in a deterministic manner. At least one implementation, described herein, generates an authentication transformation matrix based, at least in part, upon an authentication watermark and a pre-defined humanly perceptible authentication pattern (e.g., image, audio). With this implementation, it obtains subject goods that may have the authentication watermark embedded therein. It generates a humanly perceptible resultant pattern (e.g., image, audio) based, at least in part, upon the watermark detected in subject goods and the transformation matrix. If the detected watermark is the authentication watermark, then the resultant pattern and the pre-defined authentication pattern will match (or nearly so). At least one implementation, described herein, hides a secret key around the periphery of watermarked goods. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.

    Abstract translation: 这里描述的实施方式有助于对这些货物的来源的货物和/或标识的认证。 本文描述的至少一个实施方案以确定性方式将水印嵌入相对少量的数据。 至少一个本文描述的实施方案至少部分地基于认证水印和预定义的人为可感知的认证模式(例如,图像,音频)来生成认证转换矩阵。 通过这种实现,它获得可以将认证水印嵌入其中的对象商品。 至少部分地,基于在主题货物和变换矩阵中检测到的水印产生人为可感知的合成图案(例如,图像,音频)。 如果检测到的水印是认证水印,则所得到的模式和预定义的认证模式将匹配(或几乎相同)。 本文描述的至少一个实现在水印商品的周围隐藏秘密密钥。 本摘要本身并不旨在限制本专利的范围。 在所附权利要求中指出了本发明的范围。

    Digital authentication with digital and analog documents
    87.
    发明申请
    Digital authentication with digital and analog documents 有权
    使用数字和模拟文档进行数字认证

    公开(公告)号:US20040264732A1

    公开(公告)日:2004-12-30

    申请号:US10683560

    申请日:2003-10-09

    Inventor: Jun Tian

    Abstract: A watermark embedder transforms a media signal from its perceptual domain to frequency domain regions and embeds a hash of data from one frequency domain region into a watermark in another frequency domain region. Alternatively, it encodes instances of the same message into the frequency domain regions. To detect alteration of the media signal, a watermark decoder transforms a suspect signal into the frequency domain regions, extracts the watermark message from a first frequency domain region and compares it with a reference derived from another frequency domain region. The reference signal is either a hash computed from the other frequency domain region of the watermarked signal, or another instance of the same message embedded into the other frequency domain region. The decoder can be used to detect alteration of the signal, such as alteration that occurs with reproduction (printing, scanning, copying, D/A-A/D conversion, etc.), compression, cropping or swapping of media signal content, etc.

    Image pickup apparatus and image data use system
    88.
    发明申请
    Image pickup apparatus and image data use system 审中-公开
    摄像设备和图像数据使用系统

    公开(公告)号:US20040201723A1

    公开(公告)日:2004-10-14

    申请号:US10834087

    申请日:2004-04-29

    Applicant: HITACHI, LTD.

    CPC classification number: H04N1/32272 H04N1/32144 H04N2101/00 H04N2201/3236

    Abstract: An image pickup apparatus certifies unchanged image data by photographing a person using the image pickup apparatus. Two steps are carried out with the image pickup apparatus, coding image data and enciphering the coded image data, which includes changing the original data to encryption data. The enciphering also includes adding a watermark to the coded data. The coding of the image data and enciphering of the coded data are performed before the coded data is stored in a medium or is transferred to another device.

    Abstract translation: 图像拾取装置通过使用图像拾取装置拍摄人来证明不变的图像数据。 利用图像拾取装置执行两个步骤,对图像数据进行编码并对编码的图像数据进行加密,包括将原始数据改变为加密数据。 加密还包括向编码数据添加水印。 编码数据的编码和编码数据的编码在编码数据被存储在介质中或被传送到另一装置之前执行。

    Hierarchical authentication system for images and video
    89.
    发明授权
    Hierarchical authentication system for images and video 失效
    图像和视频的分层认证系统

    公开(公告)号:US06804356B1

    公开(公告)日:2004-10-12

    申请号:US09531700

    申请日:2000-03-20

    Abstract: A method and system for creating authentication signatures for digital images and video frames is provided. The method and system involves partitioning the image into multiple blocks, comparing characteristics from each block and generating data bits based on the comparison. Each block is then broken up into additional blocks and those blocks are compared to create additional signature bits which are combined with the signature sets from the first set of blocks. Each of these new smaller blocks can be further broken up and the procedure can be repeated to provide an authentication signature of desired length.

    Abstract translation: 提供了一种用于创建数字图像和视频帧的认证签名的方法和系统。 该方法和系统包括将图像划分成多个块,比较每个块的特征并基于比较产生数据位。 然后将每个块分解成另外的块,并且比较这些块以创建与来自第一组块的签名集合相组合的附加签名位。 这些新的更小的块中的每一个可以进一步分解,并且可以重复该过程以提供所需长度的认证签名。

Patent Agency Ranking