WO2006050973A1 - Vorrichtung und verfahren zum detektieren einer manipulation eines informationssignals - Google Patents
Vorrichtung und verfahren zum detektieren einer manipulation eines informationssignals Download PDFInfo
- Publication number
- WO2006050973A1 WO2006050973A1 PCT/EP2005/012114 EP2005012114W WO2006050973A1 WO 2006050973 A1 WO2006050973 A1 WO 2006050973A1 EP 2005012114 W EP2005012114 W EP 2005012114W WO 2006050973 A1 WO2006050973 A1 WO 2006050973A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- information signal
- signal
- signal component
- component
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/608—Watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Definitions
- the present invention relates to checking the integrity of information signals.
- the information signals are, for example, digital audio or video signals
- watermarks are often used to provide the data with copy protection, for example.
- the watermarks are "interweaved" with the information signal, so that removal of the watermark, for example to remove the copy protection, can inevitably leave digital traces that are detectable It is also necessary to check the integrity of the data in order to detect potential manipulation.
- the known approaches for checking the integrity of the information signals are based on encrypting the complete data by means of a cryptographic hash method.
- the cryptographic hash values are often called the checksum. They are calculated from an input value unbe ⁇ indefinite length and uniquely define a particular output value, the so-called hash (eg. As a String 'of 20 bytes).
- the specific nature of the hash function is to determine a clearly assigned output value for any desired input value from which the input value can not be recalculated.
- the complete data set is first processed using the hash algorithm, ie the hash of the data set is formed. For later integrity checking, the data volume to be tested is processed again completely using the hash algorithm. If it delivers the same hash as in the reference run, it may be assumed that no changes were made to the data set.
- hash functions can essentially be defined on three points:
- Each hash value must occur the same number of times, i. the probability of hash values should not differ for different input values.
- a change of the input value should lead to a changed hash value.
- the effort to create collisions should be very high, i. For a given input value, it should be possible to find a second one with the same hash value.
- a hash function that satisfies all three requirements is also called a cryptographic hash function.
- the most important hash functions include SHA-I, MD4, MD5 and RIPE-MD160.
- the cryptographic hash function SHA-I processes 512-bit blocks, generating 160-bit hash values. An important role is played by the 532 bit variables (chain variables) as well as the so-called compression function.
- the input value is divided into 512-bit blocks.
- the compression function picks up the five chain variables and a 512-bit block and maps these to the next 532-bit values.
- the function runs in four rounds for every 20 identical operations in which the individual bits are shifted according to predefined computing operations.
- the contents of the five chain variables are output as a hash value.
- hash integrity checking procedures is described, for example, in US Pat. In Open Mobile Alliance, OMA DRM Specification V2.0, Draft Version 2.0-10. April 2004.
- a disadvantage of the known approaches is that, by default, a complete data set, that is to say the entire information signal, is tested, which is associated with a high degree of complexity.
- no subsequent change to the data set can be made, for example, adding one or more watermarks without destroying the integrity of the data set, even if only certain data set components are changed.
- the invention is based on the recognition that a multiplicity of information signals, which are associated with different applications, for example, B. video or audio signals, have a characteristic of the information signal information for securing a data set against Manipu ⁇ lation at the same time admitting non- characteristic changes in the data set can be used.
- the integrity of the MP3-coded audio file should be checked during the check of the MP3 signal.
- the file can still be recognized as unchanged if, for example, a watermark has been added by means of bitstream watermarking.
- manipulations of the file that alter the characteristics of the piece or even result in an exchange of the piece (or parts of the piece) should be clearly identified.
- an information signal in this example of the MP3-coded audio file, inherent and characteristic information used as a sensor.
- the characteristic information of a data set i. an information signal can be determined.
- This step can be defined depending on a type and application of the data set and, in the simplest case, requires masking out non-characteristic parts, possibly also filtering or transformation of the data set in order to obtain the characteristic information.
- it is z.
- it is sufficient to extract the page information or only part of the page information without taking into account the spectral data forming the main information, the page information being related to the main information, and e.g. Includes scale factors for the spectral data. If, for example, a watermark is added to the spectral data, this does not change the characteristic information.
- the integrity of the information signal is not impaired in the sense of the invention.
- the integrity of aus ⁇ finally the characteristic information with a Cryptographic method secured or tested, for the cryptographic method, for example, be ⁇ already mentioned hash method can be used.
- the scale factors associated with the spectral data are exploited as characteristic information, so that, for example, the hash method is applied only to the scale factors, i. that the hash value is calculated only via the scale factors. If bitstream watermarking is now used, the spectral values change, but not the scale factors (scale parameters). A subsequent check of the hash thus provides agreement if there is no manipulation of the data record (of the information signal). This is sufficient, for example, to prevent that another piece can be pushed under.
- the present invention is based on securing a data record against manipulation of it characteristic information with simultaneous admission 'non-characteristic amendments gen on record.
- z For checking the integrity of a record z.
- z As a cryptographic hash method, z. SHA-I. It is used to check a one-to-one correspondence between a reference (original) and a record to be compared (copy). Result of the test is either "identical” or "deviation of some kind".
- the characteristic information of a data record is checked for integrity.
- characteristic information can be defined according to the application, an example of which is an MP3-coded piece of music, which, as described above, after a determination of the integrity information, is to be added with a watermark by means of bitstream watermarking
- the spectral values of the piece change (slightly), but the scale factors and other side information remain the same and distinguish the piece from other pieces of music, so that the characteristic information is retained.
- an MP3-encoded piece of music can still be recognized as unchanged if it has been treated with bitstream watermarking.
- the integrity of characteristic information of a data record is checked, but changes to the data record which do not change the characteristic information are permitted.
- bitstream watermarking does not disturb the integrity of the characteristic information signal portions comprising the characteristic information. This ensures that the original can not be replaced by another piece or parts of another piece, which is for example important for DRM applications, the non-characteristic information may still be changed.
- non-characteristic information can thus be changed without changing the integrity.
- a watermark can be added by means of bitstream watermarking. without this changing the integrity of the file in the sense according to the invention, ie, for example, without the hash method according to the invention reporting a deviation from the original.
- FIG. 1 shows a block diagram of a device for detecting a manipulation of an information signal according to an exemplary embodiment of the present invention.
- the device shown in FIG. 1 comprises a device 101 for extracting, whose output is coupled to an input of a device 103 for encoding.
- the device 103 for encoding comprises an output, which is coupled to an input of a device 105 for comparison.
- the information signal comprises an information signal component which is characteristic of the information signal.
- the device 101 for extracting is designed to extract the information signal component and to make the information signal component of the device 103 available for encryption.
- the means 103 for encrypting is designed to encrypt the information component, for example using a cryptographic method, in order to obtain an encrypted signal.
- the device 105 for comparison is designed to receive the encrypted signal from the device 103 for encryption and to compare the encrypted signal with a reference signal, wherein the reference signal is an encrypted representation of a non-manipulated reference signal component of a reference information mationssignals is to detect the manipulation of Informations ⁇ signal, if the information signal has been manipulated mani ⁇ .
- the device 105 can supply a control signal for comparison via an output, which indicates a manipulation of the information signal applied to an input of the device 101 for extraction.
- the device 101 may be designed for extraction, in order not to filter out a further information signal component or other information signal components of the information signal, so that a change of the further information components can not be detected. If, for example, a watermark is added to the other components of the information signal, this change in the information signal should not lead to a manipulation being detected, since permissible changes in the data record should not be detectable in order not to disturb the integrity check.
- the information signal which the device 101 processes for extraction is, for example, a copy of the information signal transmitted by the device 101 is first generated for extraction.
- the further information signal components can be masked or suppressed by the means 101 for extracting, so that only the information signal components with the characteristic information are transmitted without destroying the information signal itself.
- the device 101 for extracting is designed to detect the information signal component in the information signal and to generate a copy of the information signal component. to extract the information signal component.
- the information signal may comprise a further information signal component.
- the further information signal component comprises main information, e.g. Payload.
- the characteristic information may be, for example, page information related to the main information, and the page information is included in the information signal component to be extracted by the device 101.
- the information signal component and the further information signal component can be arranged in different sections of the information signal.
- the information signal is e.g. in the form of a data frame
- the information signal component may, for example, be arranged at a different location of the data frame than the further information signal component.
- the two components within the information signal von ⁇ spaced apart.
- the device 101 for extracting is designed to extract the section of the information signal in which the information signal component is arranged.
- the means 101 for extracting may be designed to filter out the spectral values of the information signal component in order to obtain the information signal component.
- the spectral values of the further information signal component can be suppressed, for example.
- means 101 for extracting may comprise a filter or may itself be designed as a filter in order to extract the spectral values associated with the information signal component.
- the device 101 may be designed to extract in order to carry out a spectral analysis in order to filter out the spectral values of the spectrum of the information signal component.
- the device 101 for extracting comprises a Fourier transformer which is designed to form a Fourier transform of the information signal, to null the spectral values of the further information signal component in the Fourier transformation, and to reproduce the result to transform into the time domain to obtain the information signal component.
- filtering can be carried out both when the information signal component and the further information signal component are superposed, and then also when the information signal component and the further information signal component are spaced apart from one another and different spectral ranges occupy.
- the further information signal component can be used as Hauptinforma ⁇ tion audio spectral values, 'for example, are encoded, comprise the the Audiospektral tone associated scale parameter as side information (characteristic information) are covered by the information signal component.
- the side information may be a In ⁇ formation over a number of audio spectral values, ie, information relating to the distribution of the block length (Block switching information) act, the development a Vertei ⁇ between short blocks and long blocks' (Short - blocks, long blocks).
- the further information signal component can be used as The main information comprises video information, the information signal component comprising, as further information, for example, luminance values for the video information.
- the information signal component is made available to the device 103 for encoding in order to obtain an encrypted signal by encrypting the information signal component using cryptographic methods.
- the means 103 for encrypting may for example be designed to form a hash value via the information signal component in order to obtain the encrypted signal.
- the device 103 for encrypting may also be designed to form a test sum over the information signal component.
- the means 103 for encrypting can be designed to encrypt the information signal component using, for example, the RSA algorithm using a private or public key.
- the means 103 for encoding can be designed to use any other known non-symmetrical or symmetrical encryption method in order to obtain the encrypted signal.
- the encrypted signal is compared with a reference signal.
- the reference signal can for example be encompassed by the information signal.
- the device 101 for extracting is further designed to extract the reference signal from the information signal. If the reference signal is arranged at a specific point of the information signal, then the corresponding section of the information signal comprising the reference signal is extracted.
- the reference signal may comprise a spectrum with specific reference spectral values, so that the means 101 for extracting, in analogy to the above statements, the reference filter out spectral values to extract the reference signal.
- the means for extracting may be designed to select a reference signal which is assigned to the information signal component from a plurality of reference signals.
- the reference signals can, for example, be stored in a memory for each imaginable information signal component, so that a reference signal, which is associated, for example, with the characteristic information and therefore associated with it, is selected on the basis of the extracted information signal component comprising the characteristic information becomes.
- the reference signal may be a hash value or a checksum via a non-manipulated information signal component.
- the information signal can be a result of a cryptographic encryption of a non-manipulated reference signal component, wherein, for example, the above-mentioned cryptographic methods are used.
- the non-manipulated reference signal component is, for example, identical to the original information signal component.
- the reference signal may be identical to the original, i. with the non-manipulated information signal.
- the above embodiments relate to the case that the information signal component is encrypted to check the data integrity. According to the invention, however, it is conceivable that the information signal component, which is characteristic for the information signal, is compared with a decrypted signal in order to check the integrity of the information signal, the decrypted signal stemming from a cryptographic decoding of a reference signal. According to a further aspect, the invention provides a device for detecting a manipulation of an information signal with a device for extracting an information signal component which is characteristic of the information signal from the information signal, wherein the device for extracting with the already beradie ⁇ NEN Means 101 may be identical for extracting.
- the device furthermore comprises a device for decrypting a reference signal, wherein the reference signal is an encrypted representation of a non-manipulated reference signal signal component of a reference information signal in order to obtain a decrypted signal.
- the device furthermore comprises a device for comparing the decrypted signal with the information signal component.
- the reference signal which is included, for example, by the information signal and is also extracted by the device for extraction, is, for example, an encrypted representation of the original information signal component of an original information signal.
- the means for decrypting may be configured to decrypt the signature with a public key associated with the private key to get decrypted signal.
- the reference signal can be a signal that has been encrypted using any symmetrical or non-symmetric encryption method, wherein, in the Case of a non-symmetric method, a private key has been used.
- the reference signal can now be de-keyed on the receiving side with a public key in order to obtain a decrypted version of the information signal component. After Ver ⁇ equal to the received information signal component with the decrypted version can now be determined whether there is a manipulation of the information signal.
- the present invention provides a device for generating an information signal from an input signal, wherein the input signal comprises an input signal component and a further input signal component, wherein the further input signal component comprises a main information and wherein the inputs ⁇ gear signal component includes a page information that is related to the main information.
- the input signal component corresponds, for example, to the information signal component already mentioned, and the further input signal component corresponds, for example, to the further information signal component.
- the device for generating the information signal comprises a device for encrypting the input signal component in order to obtain a reference signal.
- the device for generating comprises a device for combining the received signal component, the further receive signal component and the reference signal in order to generate the information signal.
- the device for encrypting is designed to provide the input signal component, which comprises, for example, the information characteristic for the information signal or for the information signal type, using a cryptographic method, as described above, for example have been mentioned to encrypt.
- the device can be designed to be encrypted in order to using a private key, the reference signal, as described above, can be decrypted using, for example, the public key.
- the means for encrypting may be configured to form a hash value or a checksum over the input signal component to obtain the reference signal.
- the means for composing may be formed, for example, to add the reference signal to the input signal to generate the information signal.
- the device for assembling can be designed to superimpose the reference signal on the input signal, for example, the reference signal and the input signal preferably having different spectral ranges.
- the means for composing may be configured to arrange the reference signal at an arbitrary position of the input signal.
- the integrity test it is now possible to test the integrity of the characteristic information of a data record. If changes are now made to the non-characteristic information of a data record, then the integrity test still supplies the statement identically.
- the main information mentioned above can be further processed without the Informationssignal ⁇ component or input signal component is changed.
- watermarks can be added to the further information signal component or to the further input signal component, without this having any influence on the integrity of the data.
- the characteristic information for the desired application z. B. extracted using a filter.
- this filter z For MP3-coded signals this filter z. For example, mask out all Hoffmann code values (spectral lines, spectral values), ie pass other bits through. Filters of various types are conceivable, both of which mask out the simple parts and also carry out complicated filter operations. So z. For example, in a text document, only text without formatting will be filtered out. If it is a picture, then z. For example, only luminance and no color are extracted etc.
- the characteristic information obtained is determined using a conventional cryptographic method, for example, by using a cryptographic method.
- the information signal or input signal is an MP3-coded signal, then this is decoded so far that the range can be determined in which scale factors are stored as side information.
- the hash algorithm is now applied to the scale factors of the data set and the resulting hash value is stored as a reference, with the spectral values being disregarded.
- a watermark can be added to the signal as often as desired by means of a suitable bitstream watermarking method.
- the range of the scale factors (scale parameter) is again determined (information signal component), the hash calculated using the scale factors and compared with the reference, as described above. If the characteristic information is unchanged, the hash is the same.
- characteristic information for MP3 encoded signals are e.g. B. the complete Soinformation, a certain part of the spectral te, if watermarking ver ⁇ only for the complementary part, or the already mentioned block switching information (distribution short-blocks, long blocks).
- the spectral values can be scaled, for example, with scale factors. Furthermore, the spectral values may be coded, for example Huffman coded.
- the present invention provides the ability to provide a watermark-compatible hash.
- the present invention also provides methods with the corresponding functionality in addition to the devices described.
- all functionalities of the various embodiments can be combined with each other to obtain further advantageous effects of the present invention.
- the methods according to the invention can be implemented in hardware or in software.
- the implementation can take place on a digital storage medium, in particular a floppy disk or CD with electronically readable control signals, which can cooperate with a programmable computer system such that the corresponding method is executed.
- the invention thus also relates to a computer program product with program code stored on a machine-readable carrier for carrying out at least one of the inventive methods when the computer program product runs on a computer.
- the invention can thus program computer linstrument rea ⁇ with a program code for performing the method as a when the computer program runs on a 'computer.
Abstract
Description
Claims
Priority Applications (10)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP05808377A EP1810442B1 (de) | 2004-11-11 | 2005-11-11 | Vorrichtung und verfahren zum detektieren einer manipulation eines informationssignals |
JP2007540594A JP4689679B2 (ja) | 2004-11-11 | 2005-11-11 | 情報信号の改ざんを検出するための装置及び方法 |
ES05808377T ES2387030T3 (es) | 2004-11-11 | 2005-11-11 | Dispositivo y procedimiento para detectar una manipulación de una señal de información |
AT05808377T ATE556504T1 (de) | 2004-11-11 | 2005-11-11 | Vorrichtung und verfahren zum detektieren einer manipulation eines informationssignals |
CA2587277A CA2587277C (en) | 2004-11-11 | 2005-11-11 | Device and method for detecting a manipulation of an information signal |
PL05808377T PL1810442T3 (pl) | 2004-11-11 | 2005-11-11 | Urządzenie i sposób wykrywania manipulacji sygnałem informacyjnym |
AU2005303901A AU2005303901B2 (en) | 2004-11-11 | 2005-11-11 | Device and method for detection of a manipulation of an information signal |
US11/747,179 US7917763B2 (en) | 2004-11-11 | 2007-05-10 | Device and method for detecting a manipulation of an information signal |
HK08100125.0A HK1106365A1 (en) | 2004-11-11 | 2008-01-07 | Device and method for detection of a manipulation of an information signal |
US12/958,253 US8135955B2 (en) | 2004-11-11 | 2010-12-01 | Device and method for detecting a manipulation of an information signal |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102004054549.9 | 2004-11-11 | ||
DE102004054549A DE102004054549B3 (de) | 2004-11-11 | 2004-11-11 | Vorrichtung und Verfahren zum Detektieren einer Manipulation eines Informationssignals |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/747,179 Continuation US7917763B2 (en) | 2004-11-11 | 2007-05-10 | Device and method for detecting a manipulation of an information signal |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006050973A1 true WO2006050973A1 (de) | 2006-05-18 |
Family
ID=35708911
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2005/012114 WO2006050973A1 (de) | 2004-11-11 | 2005-11-11 | Vorrichtung und verfahren zum detektieren einer manipulation eines informationssignals |
Country Status (12)
Country | Link |
---|---|
US (2) | US7917763B2 (de) |
EP (1) | EP1810442B1 (de) |
JP (1) | JP4689679B2 (de) |
CN (1) | CN101088248A (de) |
AT (1) | ATE556504T1 (de) |
AU (1) | AU2005303901B2 (de) |
CA (2) | CA2794619C (de) |
DE (1) | DE102004054549B3 (de) |
ES (1) | ES2387030T3 (de) |
HK (1) | HK1106365A1 (de) |
PL (1) | PL1810442T3 (de) |
WO (1) | WO2006050973A1 (de) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19947877C2 (de) * | 1999-10-05 | 2001-09-13 | Fraunhofer Ges Forschung | Verfahren und Vorrichtung zum Einbringen von Informationen in einen Datenstrom sowie Verfahren und Vorrichtung zum Codieren eines Audiosignals |
EP2439943A1 (de) | 2010-10-07 | 2012-04-11 | Nagravision S.A. | System und Verfahren zur Vermeidung der Manipulation übertragener Videodaten |
DE102014204417A1 (de) * | 2014-03-11 | 2015-09-17 | Siemens Aktiengesellschaft | Vorrichtung und Verfahren zum Detektieren einer Manipulation an einem Programmcode |
WO2017052392A1 (en) * | 2015-09-25 | 2017-03-30 | Intel Corporation | Facilitating efficient detection of patterns in graphics display streams prior to their display at computing devices |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020178368A1 (en) * | 2001-05-24 | 2002-11-28 | Peng Yin | Semi-fragile watermarking system for MPEG video authentication |
US20040128511A1 (en) * | 2000-12-20 | 2004-07-01 | Qibin Sun | Methods and systems for generating multimedia signature |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7289643B2 (en) * | 2000-12-21 | 2007-10-30 | Digimarc Corporation | Method, apparatus and programs for generating and utilizing content signatures |
US5870754A (en) * | 1996-04-25 | 1999-02-09 | Philips Electronics North America Corporation | Video retrieval of MPEG compressed sequences using DC and motion signatures |
US5907619A (en) * | 1996-12-20 | 1999-05-25 | Intel Corporation | Secure compressed imaging |
US6243480B1 (en) * | 1998-04-30 | 2001-06-05 | Jian Zhao | Digital authentication with analog documents |
CA2310769C (en) * | 1999-10-27 | 2013-05-28 | Nielsen Media Research, Inc. | Audio signature extraction and correlation |
AU2002214613A1 (en) * | 2000-11-08 | 2002-05-21 | Digimarc Corporation | Content authentication and recovery using digital watermarks |
DE10134682B4 (de) | 2001-07-20 | 2009-07-30 | Mediasec Technologies Gmbh | Verfahren und Vorrichtung zur Bestätigung der Echtheit eines Dokumentes und elektronischer Tresor zur Speicherung der Daten |
JP4454908B2 (ja) * | 2002-04-05 | 2010-04-21 | キヤノン株式会社 | 情報処理装置、情報処理方法、プログラム及び記録媒体 |
US20050259819A1 (en) * | 2002-06-24 | 2005-11-24 | Koninklijke Philips Electronics | Method for generating hashes from a compressed multimedia content |
-
2004
- 2004-11-11 DE DE102004054549A patent/DE102004054549B3/de active Active
-
2005
- 2005-11-11 CA CA2794619A patent/CA2794619C/en active Active
- 2005-11-11 WO PCT/EP2005/012114 patent/WO2006050973A1/de active Application Filing
- 2005-11-11 AT AT05808377T patent/ATE556504T1/de active
- 2005-11-11 CA CA2587277A patent/CA2587277C/en active Active
- 2005-11-11 CN CNA200580038554XA patent/CN101088248A/zh active Pending
- 2005-11-11 AU AU2005303901A patent/AU2005303901B2/en active Active
- 2005-11-11 ES ES05808377T patent/ES2387030T3/es active Active
- 2005-11-11 JP JP2007540594A patent/JP4689679B2/ja active Active
- 2005-11-11 PL PL05808377T patent/PL1810442T3/pl unknown
- 2005-11-11 EP EP05808377A patent/EP1810442B1/de active Active
-
2007
- 2007-05-10 US US11/747,179 patent/US7917763B2/en active Active
-
2008
- 2008-01-07 HK HK08100125.0A patent/HK1106365A1/xx unknown
-
2010
- 2010-12-01 US US12/958,253 patent/US8135955B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040128511A1 (en) * | 2000-12-20 | 2004-07-01 | Qibin Sun | Methods and systems for generating multimedia signature |
US20020178368A1 (en) * | 2001-05-24 | 2002-11-28 | Peng Yin | Semi-fragile watermarking system for MPEG video authentication |
Non-Patent Citations (1)
Title |
---|
SCHNEIDER M ET AL: "A robust content based digital signature for image authentication", 16 September 1996, PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP) LAUSANNE, SEPT. 16 - 19, 1996, NEW YORK, IEEE, US, PAGE(S) 227-230, ISBN: 0-7803-3259-8, XP010202372 * |
Also Published As
Publication number | Publication date |
---|---|
US7917763B2 (en) | 2011-03-29 |
HK1106365A1 (en) | 2008-04-11 |
ATE556504T1 (de) | 2012-05-15 |
AU2005303901A1 (en) | 2006-05-18 |
DE102004054549B3 (de) | 2006-05-11 |
JP4689679B2 (ja) | 2011-05-25 |
CA2794619A1 (en) | 2006-05-18 |
AU2005303901B2 (en) | 2009-01-08 |
CA2794619C (en) | 2016-07-19 |
ES2387030T3 (es) | 2012-09-12 |
CA2587277C (en) | 2014-01-28 |
PL1810442T3 (pl) | 2012-10-31 |
US8135955B2 (en) | 2012-03-13 |
CN101088248A (zh) | 2007-12-12 |
EP1810442B1 (de) | 2012-05-02 |
CA2587277A1 (en) | 2006-05-18 |
EP1810442A1 (de) | 2007-07-25 |
US20110099386A1 (en) | 2011-04-28 |
US20070277041A1 (en) | 2007-11-29 |
JP2008520134A (ja) | 2008-06-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE69434237T2 (de) | Video mit versteckten in-Band digitalen Daten | |
DE602004010673T2 (de) | Inhaltsidentifikation für broadcast-medien | |
EP2899714A1 (de) | Gesichertes Bereitstellen eines Schlüssels | |
DE102014208212A1 (de) | Ableiten eines gerätespezifischen Wertes | |
EP3254403A1 (de) | Vorrichtung und verfahren zum erzeugen eines schlüssels in einem programmierbaren hardwaremodul | |
DE60212128T2 (de) | Bild-/Videokommunikation mit Wasserzeichen | |
DE102020007344A1 (de) | Sicheres Audiowasserzeichenmarkieren auf Grundlage neuronaler Netzwerke | |
WO2006050973A1 (de) | Vorrichtung und verfahren zum detektieren einer manipulation eines informationssignals | |
DE602005002696T2 (de) | Erkennung von Änderungen in digitalen Daten mittels empfindlichen Wasserzeichens | |
EP2191408A1 (de) | Verfahren und vorrichtung zum codieren von datenworten | |
EP3175577B1 (de) | Verfahren zur erzeugung einer digitalen signatur | |
DE102014213454A1 (de) | Verfahren und System zur Erkennung einer Manipulation von Datensätzen | |
EP1817711A1 (de) | Vorrichtungen und verfahren zum prüfen und ermitteln von prüfwerten | |
EP2672419B1 (de) | Verfahren zum Erzeugen eines gesicherten Datenobjekts und System | |
EP2122569B1 (de) | Verfahren zur kennzeichnung eines digitalen bildes mit einem digitalen wasserzeichen | |
DE102006005177A1 (de) | Verfahren und Vorrichtung zum Nachweis der Verschlüsselung von digitalen Daten innerhalb eines DRM-Systems | |
DE102008028881A1 (de) | Verfahren und System zum prüfen und autorisieren von Inhalt | |
DE19615302A1 (de) | Verfahren und Vorrichtung zum Aufzeichnen/Verarbeiten von authentischen Tondaten | |
DE10059320A1 (de) | Invertierbare digitale Wasserzeichen zur Manipulationserkennung und Reproduktion des Originals unter Verwendung von kryptographischen Mechanismen | |
DE102016110935B3 (de) | Verfahren und Auswertevorrichtung zum Auswerten von Falldaten eines Verkehrsüberwachungsgeräts | |
DE102022206380A1 (de) | Verfahren für eine Überprüfung einer Datenintegrität | |
EP2595061A2 (de) | Verfahren zum Schutz gegen Schadcode | |
DE102020134448A1 (de) | Sicherheitsvorrichtung und Verfahren zur sicheren Übertragung von digitalen Daten | |
DE102018005102A1 (de) | Adaptive Sicherheitsupdates für Applikationen | |
DE102010044228B4 (de) | Verfahren zur Auswertung von mit Transaktionswasserzeichen markiertem Datenmaterial zwecks Kundenrückverfolgung |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KN KP KR KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2005808377 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11747179 Country of ref document: US Ref document number: 2587277 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007540594 Country of ref document: JP Ref document number: 200580038554.X Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2005303901 Country of ref document: AU |
|
ENP | Entry into the national phase |
Ref document number: 2005303901 Country of ref document: AU Date of ref document: 20051111 Kind code of ref document: A |
|
WWP | Wipo information: published in national office |
Ref document number: 2005303901 Country of ref document: AU |
|
WWP | Wipo information: published in national office |
Ref document number: 2005808377 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 11747179 Country of ref document: US |