AU2022353195A1 - Process for embedding a digital watermark in tokenised data - Google Patents
Process for embedding a digital watermark in tokenised data Download PDFInfo
- Publication number
- AU2022353195A1 AU2022353195A1 AU2022353195A AU2022353195A AU2022353195A1 AU 2022353195 A1 AU2022353195 A1 AU 2022353195A1 AU 2022353195 A AU2022353195 A AU 2022353195A AU 2022353195 A AU2022353195 A AU 2022353195A AU 2022353195 A1 AU2022353195 A1 AU 2022353195A1
- Authority
- AU
- Australia
- Prior art keywords
- watermark
- tokens
- data
- token
- hash
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB202113485 | 2021-09-22 | ||
| GB2113485.3 | 2021-09-22 | ||
| PCT/GB2022/052401 WO2023047114A1 (en) | 2021-09-22 | 2022-09-22 | Process for embedding a digital watermark in tokenised data |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| AU2022353195A1 true AU2022353195A1 (en) | 2024-04-04 |
| AU2022353195A2 AU2022353195A2 (en) | 2024-05-09 |
Family
ID=83995444
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AU2022353195A Pending AU2022353195A1 (en) | 2021-09-22 | 2022-09-22 | Process for embedding a digital watermark in tokenised data |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US20250005115A1 (https=) |
| EP (1) | EP4405837A1 (https=) |
| JP (1) | JP2024535885A (https=) |
| AU (1) | AU2022353195A1 (https=) |
| CA (1) | CA3231917A1 (https=) |
| WO (1) | WO2023047114A1 (https=) |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN118282779B (zh) * | 2024-05-31 | 2024-07-26 | 杭州海康威视数字技术股份有限公司 | 基于神经网络的密态多媒体数据安全防御方法及装置 |
| CN120374346B (zh) * | 2025-06-26 | 2025-08-26 | 南京信息工程大学 | 基于生成对抗网络和多令牌的抗屏摄鲁棒水印方法 |
Family Cites Families (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI272547B (en) * | 2005-07-28 | 2007-02-01 | Academia Sinica | Asymmetric watermarking |
| RU2008135353A (ru) * | 2006-01-30 | 2010-03-10 | Конинклейке Филипс Электроникс Н.В. (Nl) | Поиск водяного знака в сигнале данных |
| EP2991028B1 (en) * | 2014-08-29 | 2019-12-11 | Thomson Licensing | Method for watermarking a three-dimensional object and method for obtaining a payload from a threedimensional object |
| GB201521134D0 (en) | 2015-12-01 | 2016-01-13 | Privitar Ltd | Privitar case 1 |
| US11698990B2 (en) * | 2016-04-29 | 2023-07-11 | Privitar Limited | Computer-implemented privacy engineering system and method |
| FI129030B (en) * | 2020-04-09 | 2021-05-31 | Veikkaus Oy | Electronic depleting pool lottery |
| US20240211552A1 (en) * | 2021-06-26 | 2024-06-27 | Zhong Li | System and Methods for Asset Management |
| CN119026095B (zh) * | 2024-08-16 | 2025-09-26 | 山东大学 | 基于物理不可克隆函数水印和区块链的版权保护及溯源方法 |
-
2022
- 2022-09-22 WO PCT/GB2022/052401 patent/WO2023047114A1/en not_active Ceased
- 2022-09-22 AU AU2022353195A patent/AU2022353195A1/en active Pending
- 2022-09-22 JP JP2024517449A patent/JP2024535885A/ja active Pending
- 2022-09-22 US US18/693,056 patent/US20250005115A1/en active Pending
- 2022-09-22 CA CA3231917A patent/CA3231917A1/en active Pending
- 2022-09-22 EP EP22793782.8A patent/EP4405837A1/en active Pending
Also Published As
| Publication number | Publication date |
|---|---|
| EP4405837A1 (en) | 2024-07-31 |
| AU2022353195A2 (en) | 2024-05-09 |
| CA3231917A1 (en) | 2023-03-30 |
| US20250005115A1 (en) | 2025-01-02 |
| JP2024535885A (ja) | 2024-10-02 |
| WO2023047114A1 (en) | 2023-03-30 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20250328691A1 (en) | Digital watermarking without significant information loss in anonymized datasets | |
| Mandal et al. | Symmetric key image encryption using chaotic Rossler system | |
| US20250005115A1 (en) | Process for embedding a digital watermark in tokenised data | |
| Chang et al. | Hiding secret points amidst chaff | |
| US7730037B2 (en) | Fragile watermarks | |
| CN119150329B (zh) | 固态硬盘的数据加密方法及系统 | |
| JP2019508832A (ja) | データベース・テーブル、テキスト・ファイル、及びデータ・フィード中におけるソルティング・テキスト及びフィンガープリンティング | |
| EP4673851A1 (en) | Process for embedding a digital watermark within generated content | |
| Breitinger et al. | Security and implementation analysis of the similarity digest sdhash | |
| WO2021115589A1 (en) | Devices and methods for applying and extracting a digital watermark to a database | |
| Hadian Dehkordi et al. | Changeable essential threshold secret image sharing scheme with verifiability using bloom filter | |
| CN118590587A (zh) | 基于递归msb平面预测的高容量加密图像可逆信息隐藏方法 | |
| Esponda | Hiding a needle in a haystack using negative databases | |
| US20110123023A1 (en) | Apparatus for video encryption by randomized block shuffling and method thereof | |
| CN115834792A (zh) | 基于人工智能的视频数据处理方法及系统 | |
| GB2611640A (en) | Watermarking of genomic sequencing data | |
| Zhang et al. | HOPE-L: A Lossless Database Watermarking Method in Homomorphic Encryption Domain | |
| CN114124469A (zh) | 数据处理的方法、装置和设备 | |
| Yang et al. | An efficient PIR construction using trusted hardware | |
| KR101895848B1 (ko) | 문서 보안 방법 | |
| CN116992495B (zh) | 办公室文件加密存储方法、系统、存储介质及电子设备 | |
| Ker | Information hiding | |
| JPWO2023047114A5 (https=) | ||
| Parameswaran | Learning With Errors Parameter Analysis | |
| CN117909551A (zh) | 加密数据检索方法、数据加密方法和数据库管理系统 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| DA3 | Amendments made section 104 |
Free format text: THE NATURE OF THE AMENDMENT IS AS SHOWN IN THE STATEMENT FILED 24 APR 2024 |