Abstract:
A flexible framework for generating “scalable layered access” codestreams allows a bitstream architect to select the number of access types and the number of access layers within each access type. At least some of the access layers are encrypted (or scrambled). Some of the access layers may be left unencrypted or unscrambled to allow free access to those layers. The framework facilitates simultaneous access of multimedia content by different users enjoying selective decryption of different access types and different access layers. An exemplary key schema for the framework sends only one or only a few keys to an end user for a given access layer, from which decryption keys for the content can be derived by hashing and then combining under a Group Diffie-Hellman key agreement. In one implementation, only one key is sent in a license to an end user and other partial key information for Group Diffie-Hellman combination with the licensed key is included in the publicly distributed codestream.
Abstract:
The described implementations relate to establishing authenticated communication between a client computing device and a service provider. In one implementation, once a registration procedure is complete, multiple authentication servers are used by a client computing device and a service provider to facilitate the establishment of an authenticated communication session. However, the authentication servers are not necessarily trusted authorities. That is, secrets of the various described devices are not revealed to each other.
Abstract:
Disclosed are compounds, compositions and methods for treating various diseases, syndromes, conditions and disorders, including pain. Such compounds are represented by Formula (I) as follows: wherein A, L, R1, R2, R4 and R5 are defined herein.
Abstract:
A volume coil for a magnetic resonance imaging system is composed of a number of coil units. In the coil, there are overlapped parts between two adjacent ones of the coil units for eliminating coupling between these two adjacent coil units. Two next-adjacent ones of the coil units, which are separated from each other by one coil unit, are each provided with an inductor, and these two inductors are coupled with each other for eliminating coupling between these two next-adjacent coil units. All coil units are collected on one axial end face of the coil. Two coil units in the coil that are neither adjacent coil units nor next-adjacent coil units are connected with each other on the end face by a capacitance circuit or a inductance circuit for eliminating the coupling between these two coil units that are neither adjacent coil units nor next-adjacent coil units. The coupling among the various coil units is relatively thoroughly eliminated, and the signal-to-noise ratio of the signal received by the coil is increased.
Abstract:
A method for disassembling an executable binary (binary). In one implementation, a plurality of potential address references may be identified based on the binary and a plurality of storage addresses containing the binary. A plurality of assembler source code instructions (instructions) may be generated by disassembling the binary. The binary may be disassembled at one or more sequential addresses starting at each of the plurality of potential address references.
Abstract:
The present invention relates to compounds having a structure according to Formula (I) wherein n, m, z, R, R2, R3, R4, R5, R6, A, E, X, Y, a and b are as defined above; or an optical isomer, diastereomer or enantiomer thereof; a pharmaceutically acceptable salt, hydrate, or prodrug thereof.
Abstract:
Systems and methods for secure multimedia authentication with discrete level tamper localization are described. In these aspects, the term “discrete” means that tamper localization is at the pixel level with respect to an image or video data, or at the sample level with respect to audio data. More particularly, and in one aspect, multimedia is evaluated to determine authenticity of the multimedia. This evaluation is based on data block(s). Responsive to determining that the multimedia is not authentic, a tampered portion of the multimedia is localized by addressing each respective pixel or sample of the tampered portion.
Abstract:
A method of embedding a watermarking in a host signal computes a first watermark depending on a particular party and computes a second watermark depending on the host signal. The method embeds the first and second watermarks in the host signal. At least one of the watermarks is embedded using a key derived from the host signal. In particular, one of the watermarks is embedded with a key derived from the host signal.
Abstract:
A method of embedding data into an audio signal provides a data sequence for embedding in the audio signal and computes masking thresholds for the audio signal from a frequency domain transform of the audio signal. The masking thresholds correspond to subbands of the audio signal, which are obtained from a masking model used to compress the audio signal. The method applies the masking threshold to the data sequence to produce masked data sequence and inserts the masked data sequence in the audio signal to produce an embedded audio signal. A method of detecting data embedded in an audio signal analyzes the audio signal to estimate the masking threshold used in embedding the data and applies the estimated masking threshold to the audio signal to extract the embedded data.
Abstract:
The invention relates to the observation that the p38 mitogen-activated protein kinase pathway is an important regulator of biogenic amine transporter (BAT) function. By using modulator of p38 MAPK, one can alter BAT function in a specific manner. This recognition of the pathway and its interaction with the serotonin transporter (SERT) and the norepinephrine transporter (NET), along with the PPA, PKG and PDE pathways, also provides the opportunity to identify polymorphisms that will impact the efficacy of drugs that act though on these enzymes or their pathways.