摘要:
A method and system is provided for encrypting an image compressed with a JPEG2000-based compression with minimal overhead so that the encrypted codestream is compliant with the syntax of the JPEG2000-based compression and can be scaled without decrypting. The encryption system generates, for each independent encryption segment of a codestream for an image, a unique initialization vector from a global initialization vector in such a way that the initialization vectors can be generated during decryption from the global initialization vector, even after truncation. The encryption system encrypts each independent encryption segment using its unique initialization vector. The encryption system ensures that the encrypted codestream is compliant with the syntax of the JPEG2000-based compression both as originally generated and as truncated by an encryption-unaware device.
摘要:
In a peer-to-peer environment, copyrights and users' privacies can be protected by a tracking mechanism. In described implementations, tracking mechanisms can use certificates that are produced using random numbers to protect the privacy of users and/or certificates that are produced responsive to at least one hardware identifier to enable uploader to be identified to protect copyrights.
摘要:
A fast and secure syntax compliant encryption schema, “locally iterative encryption,” can produce compliant ciphertext for a general syntax specification. In one implementation, an engine partitions a data stream into blocks, and encrypts each block iteratively until syntax compliance conditions are met. A system using the schema can utilize either stream ciphers or block ciphers in different modes. Locally iterative encryption methods are fast and remain at approximately the same speed even as the length of the data stream to be encrypted increases. Besides providing superior processing speed, the locally iterative encryption schema is also more robust to errors in the resulting ciphertext and in the resulting decrypted plaintext than conventional syntax compliant encryption techniques. Locally iterative encryption is secure as long as an underlying encryption cipher selected for use in the schema is secure.
摘要:
A flexible framework for generating “scalable layered access” codestreams allows a bitstream architect to select the number of access types and the number of access layers within each access type. At least some of the access layers are encrypted (or scrambled). Some of the access layers may be left unencrypted or unscrambled to allow free access to those layers. The framework facilitates simultaneous access of multimedia content by different users enjoying selective decryption of different access types and different access layers. An exemplary key schema for the framework sends only one or only a few keys to an end user for a given access layer, from which decryption keys for the content can be derived by hashing and then combining under a Group Diffie-Hellman key agreement. In one implementation, only one key is sent in a license to an end user and other partial key information for Group Diffie-Hellman combination with the licensed key is included in the publicly distributed codestream.
摘要:
The described implementations relate to establishing authenticated communication between a client computing device and a service provider. In one implementation, once a registration procedure is complete, multiple authentication servers are used by a client computing device and a service provider to facilitate the establishment of an authenticated communication session. However, the authentication servers are not necessarily trusted authorities. That is, secrets of the various described devices are not revealed to each other.
摘要:
Disclosed are compounds, compositions and methods for treating various diseases, syndromes, conditions and disorders, including pain. Such compounds are represented by Formula (I) as follows: wherein A, L, R1, R2, R4 and R5 are defined herein.
摘要:
A method for disassembling an executable binary (binary). In one implementation, a plurality of potential address references may be identified based on the binary and a plurality of storage addresses containing the binary. A plurality of assembler source code instructions (instructions) may be generated by disassembling the binary. The binary may be disassembled at one or more sequential addresses starting at each of the plurality of potential address references.
摘要:
The present invention relates to compounds having a structure according to Formula (I) wherein n, m, z, R, R2, R3, R4, R5, R6, A, E, X, Y, a and b are as defined above; or an optical isomer, diastereomer or enantiomer thereof; a pharmaceutically acceptable salt, hydrate, or prodrug thereof.
摘要:
Systems and methods for secure multimedia authentication with discrete level tamper localization are described. In these aspects, the term “discrete” means that tamper localization is at the pixel level with respect to an image or video data, or at the sample level with respect to audio data. More particularly, and in one aspect, multimedia is evaluated to determine authenticity of the multimedia. This evaluation is based on data block(s). Responsive to determining that the multimedia is not authentic, a tampered portion of the multimedia is localized by addressing each respective pixel or sample of the tampered portion.
摘要:
A method of embedding a watermarking in a host signal computes a first watermark depending on a particular party and computes a second watermark depending on the host signal. The method embeds the first and second watermarks in the host signal. At least one of the watermarks is embedded using a key derived from the host signal. In particular, one of the watermarks is embedded with a key derived from the host signal.