AU2022353195A1 - Process for embedding a digital watermark in tokenised data - Google Patents

Process for embedding a digital watermark in tokenised data Download PDF

Info

Publication number
AU2022353195A1
AU2022353195A1 AU2022353195A AU2022353195A AU2022353195A1 AU 2022353195 A1 AU2022353195 A1 AU 2022353195A1 AU 2022353195 A AU2022353195 A AU 2022353195A AU 2022353195 A AU2022353195 A AU 2022353195A AU 2022353195 A1 AU2022353195 A1 AU 2022353195A1
Authority
AU
Australia
Prior art keywords
watermark
tokens
data
token
hash
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
AU2022353195A
Other languages
English (en)
Other versions
AU2022353195A2 (en
Inventor
Paul Mellor
Sasi Kumar MURAKONDA
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Privitar Ltd
Original Assignee
Privitar Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Privitar Ltd filed Critical Privitar Ltd
Publication of AU2022353195A1 publication Critical patent/AU2022353195A1/en
Publication of AU2022353195A2 publication Critical patent/AU2022353195A2/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)
AU2022353195A 2021-09-22 2022-09-22 Process for embedding a digital watermark in tokenised data Pending AU2022353195A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
GB202113485 2021-09-22
GB2113485.3 2021-09-22
PCT/GB2022/052401 WO2023047114A1 (en) 2021-09-22 2022-09-22 Process for embedding a digital watermark in tokenised data

Publications (2)

Publication Number Publication Date
AU2022353195A1 true AU2022353195A1 (en) 2024-04-04
AU2022353195A2 AU2022353195A2 (en) 2024-05-09

Family

ID=83995444

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2022353195A Pending AU2022353195A1 (en) 2021-09-22 2022-09-22 Process for embedding a digital watermark in tokenised data

Country Status (6)

Country Link
US (1) US20250005115A1 (https=)
EP (1) EP4405837A1 (https=)
JP (1) JP2024535885A (https=)
AU (1) AU2022353195A1 (https=)
CA (1) CA3231917A1 (https=)
WO (1) WO2023047114A1 (https=)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118282779B (zh) * 2024-05-31 2024-07-26 杭州海康威视数字技术股份有限公司 基于神经网络的密态多媒体数据安全防御方法及装置
CN120374346B (zh) * 2025-06-26 2025-08-26 南京信息工程大学 基于生成对抗网络和多令牌的抗屏摄鲁棒水印方法

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI272547B (en) * 2005-07-28 2007-02-01 Academia Sinica Asymmetric watermarking
RU2008135353A (ru) * 2006-01-30 2010-03-10 Конинклейке Филипс Электроникс Н.В. (Nl) Поиск водяного знака в сигнале данных
EP2991028B1 (en) * 2014-08-29 2019-12-11 Thomson Licensing Method for watermarking a three-dimensional object and method for obtaining a payload from a threedimensional object
GB201521134D0 (en) 2015-12-01 2016-01-13 Privitar Ltd Privitar case 1
US11698990B2 (en) * 2016-04-29 2023-07-11 Privitar Limited Computer-implemented privacy engineering system and method
FI129030B (en) * 2020-04-09 2021-05-31 Veikkaus Oy Electronic depleting pool lottery
US20240211552A1 (en) * 2021-06-26 2024-06-27 Zhong Li System and Methods for Asset Management
CN119026095B (zh) * 2024-08-16 2025-09-26 山东大学 基于物理不可克隆函数水印和区块链的版权保护及溯源方法

Also Published As

Publication number Publication date
EP4405837A1 (en) 2024-07-31
AU2022353195A2 (en) 2024-05-09
CA3231917A1 (en) 2023-03-30
US20250005115A1 (en) 2025-01-02
JP2024535885A (ja) 2024-10-02
WO2023047114A1 (en) 2023-03-30

Similar Documents

Publication Publication Date Title
US20250328691A1 (en) Digital watermarking without significant information loss in anonymized datasets
Mandal et al. Symmetric key image encryption using chaotic Rossler system
US20250005115A1 (en) Process for embedding a digital watermark in tokenised data
Chang et al. Hiding secret points amidst chaff
US7730037B2 (en) Fragile watermarks
CN119150329B (zh) 固态硬盘的数据加密方法及系统
JP2019508832A (ja) データベース・テーブル、テキスト・ファイル、及びデータ・フィード中におけるソルティング・テキスト及びフィンガープリンティング
EP4673851A1 (en) Process for embedding a digital watermark within generated content
Breitinger et al. Security and implementation analysis of the similarity digest sdhash
WO2021115589A1 (en) Devices and methods for applying and extracting a digital watermark to a database
Hadian Dehkordi et al. Changeable essential threshold secret image sharing scheme with verifiability using bloom filter
CN118590587A (zh) 基于递归msb平面预测的高容量加密图像可逆信息隐藏方法
Esponda Hiding a needle in a haystack using negative databases
US20110123023A1 (en) Apparatus for video encryption by randomized block shuffling and method thereof
CN115834792A (zh) 基于人工智能的视频数据处理方法及系统
GB2611640A (en) Watermarking of genomic sequencing data
Zhang et al. HOPE-L: A Lossless Database Watermarking Method in Homomorphic Encryption Domain
CN114124469A (zh) 数据处理的方法、装置和设备
Yang et al. An efficient PIR construction using trusted hardware
KR101895848B1 (ko) 문서 보안 방법
CN116992495B (zh) 办公室文件加密存储方法、系统、存储介质及电子设备
Ker Information hiding
JPWO2023047114A5 (https=)
Parameswaran Learning With Errors Parameter Analysis
CN117909551A (zh) 加密数据检索方法、数据加密方法和数据库管理系统

Legal Events

Date Code Title Description
DA3 Amendments made section 104

Free format text: THE NATURE OF THE AMENDMENT IS AS SHOWN IN THE STATEMENT FILED 24 APR 2024