Abstract:
The present invention relates to a computer-implemented method, system and computer readable medium for searching over encrypted keywords in a database. The method includes the steps of generating at least one keyword, generating a plurality of different encrypted keywords corresponding to the keyword, storing the at least one encrypted keyword in the database, generating a plurality of different trapdoors for the keyword, verifying the plurality of different trapdoors with the plurality of different encrypted keywords corresponding to the keyword, and determining the keyword is found if the plurality of different trapdoors match with one the encrypted keyword corresponding to the keyword, otherwise determining the keyword is not found.
Abstract:
A method, non-transitory computer readable medium, and video analyzing computing device that generates a scene averaged frame value for each scene of an original video and a each scene of a resembling video. Each of a subset of the scenes of the resembling video is mapped to a corresponding scene of the original video based on a comparison of the scene averaged frame values. A singular value score is generated for each frame of each of the subset of scenes of the resembling video and each frame of the corresponding one of the scenes of the original video is generated. Matching one(s) of the one or more frames of each of the at least a subset of scenes of the resembling video is identified based on a comparison of at least a subset of the singular value scores. A first watermark is extracted from the identified matching frames.
Abstract:
A method and system for a multi-user searchable encryption system over ordered keywords is disclosed. The system includes a key generation server which issues a primary key to a user terminal device and a secondary key to a proxy server. A trapdoor is sent by the user terminal and received by the proxy server. The trapdoor is encrypted at the proxy server. The proxy server receives cypher text from the user terminal and sends the cypher text to the database server. A search keyword inputted by the user at the user terminal is used to perform a lookup in encrypted data.
Abstract:
The geometric distortions of videos and images are corrected wherein a plurality of geometrically distorted frames are mapped with a plurality of original frames of the video content. Further, one or more features associated with the mapped frames are identified as insensitive to the one or more geometric distortions. One or more features of the mapped frames are further mapped with original frames based on a predefined similarity threshold and thereafter one or more geometric distortion parameters are determined. Furthermore, a frame level average distortion and a video level average distortion of each of the one or more geometric distortion parameters are determined, based on which the one or more geometric distortions of the video content are corrected.
Abstract:
Method, apparatus and non-transitory computer readable medium for embedding and extracting a watermark in a text document using digital watermarking processes is disclosed. When the text document is watermarked, the following steps are performed. The pages of the text document are transformed into corresponding images. Then, the margins on each of the images are detected and cropped to generate the cropped images. The cropped images are segmented into blocks among which some blocks are selected based on content of each block. The watermark is embedded in the selected blocks using a digital watermarking process. When the watermark from the watermarked text document is extracted, the watermark-embedding process is referred to determine the block information, for selecting each block of a watermarked text document, from where the watermark needs to be extracted.
Abstract:
A method, device and non-transitory computer readable medium for scene based video watermarking. Methods are disclosed to detect the scenes inside the video. Disclosed devices and methods are capable of scene change detection for both, gradual and abrupt scenes. Methods are also disclosed to group logical scenes in a video. The disclosed methods are aided with methods to reduce the computational time taken for scene change detection. Watermarks are created and segmented using a plurality of unique identifiers to limit any unauthorized use of the video.
Abstract:
A method, non-transitory computer readable medium, and video analyzing computing device that generates a scene averaged frame value for each scene of an original video and a each scene of a resembling video. Each of a subset of the scenes of the resembling video is mapped to a corresponding scene of the original video based on a comparison of the scene averaged frame values. A singular value score is generated for each frame of each of the subset of scenes of the resembling video and each frame of the corresponding one of the scenes of the original video is generated. Matching one(s) of the one or more frames of each of the at least a subset of scenes of the resembling video is identified based on a comparison of at least a subset of the singular value scores. A first watermark is extracted from the identified matching frames.
Abstract:
An embodiment for securely accessing services of a service provider based on single sign on. The user device is authenticated by an authentication server if the computed hash of the first random number r is same as the received hash of the first random number r sent by a user device. Thereafter, the second random number y, the user id and an element Q are encrypted using a service provider password and send to the service provider. The user device computes a first discrete exponential function Z using the element Q and the second random number y and sends along with the user id to the service provider. The service provider computes a second discrete exponential function Z′ using the element Q and the second random number y received from the authentication server and provides the user device access to the services if Z is equal to Z′.
Abstract:
A method, device and non-transitory computer readable medium for scene based video watermarking. Methods are disclosed to detect the scenes inside the video. Disclosed devices and methods are capable of scene change detection for both, gradual and abrupt scenes. Methods are also disclosed to group logical scenes in a video. The disclosed methods are aided with methods to reduce the computational time taken for scene change detection. Watermarks are created and segmented using a plurality of unique identifiers to limit any unauthorized use of the video.
Abstract:
An embodiment for securely accessing services of a service provider based on single sign on. The user device is authenticated by an authentication server if the computed hash of the first random number r is same as the received hash of the first random number r sent by a user device. Thereafter, the second random number y, the user id and an element Q are encrypted using a service provider password and send to the service provider. The user device computes a first discrete exponential function Z using the element Q and the second random number y and sends along with the user id to the service provider. The service provider computes a second discrete exponential function Z′ using the element Q and the second random number y received from the authentication server and provides the user device access to the services if Z is equal to Z′.