CN105376597A - Digital encapsulation for digital image and video - Google Patents

Digital encapsulation for digital image and video Download PDF

Info

Publication number
CN105376597A
CN105376597A CN201510501840.0A CN201510501840A CN105376597A CN 105376597 A CN105376597 A CN 105376597A CN 201510501840 A CN201510501840 A CN 201510501840A CN 105376597 A CN105376597 A CN 105376597A
Authority
CN
China
Prior art keywords
digital
preprocessor
archives
data
honored
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510501840.0A
Other languages
Chinese (zh)
Inventor
章成栋
李卓谕
杰弗里·章
史蒂夫·陈
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Spatial Digital Systems Inc
Original Assignee
Spatial Digital Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US14/685,651 external-priority patent/US20160048697A1/en
Application filed by Spatial Digital Systems Inc filed Critical Spatial Digital Systems Inc
Publication of CN105376597A publication Critical patent/CN105376597A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/235Processing of additional data, e.g. scrambling of additional data or processing content descriptors
    • H04N21/2351Processing of additional data, e.g. scrambling of additional data or processing content descriptors involving encryption of additional data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/238Interfacing the downstream path of the transmission network, e.g. adapting the transmission rate of a video stream to network bandwidth; Processing of multiplex streams
    • H04N21/2389Multiplex stream processing, e.g. multiplex stream encrypting
    • H04N21/23895Multiplex stream processing, e.g. multiplex stream encrypting involving multiplex stream encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention relates to a technology for using digital encapsulation/de-encapsulation in the field of digital rights management. The original digital archives are named as the mother edition of archives. Other copies are all children editions. Each children edition is generated by embedding unique digital code and unique labeling archive into the mother edition taken as the digital envelop through a digital encapsulation technology. The unique digital label related with a certain children edition can only be recovered by de-encapsulating the mother edition at the same time. The archives for publication and distribution are all children editions and the mother edition is safely stored.

Description

Number for digital image is sealed up
Technical field
The present invention relates to method and the framework thereof of data packaging (number is sealed up) of cloud storage and transmission.The method that this number is sealed up and framework utilize wavefront to cover use (WF covers use).Its emphasis is number is sealed up and digital solution is sealed up outward appearance and the reliability adding data of being honored as a queen.
Background technology
According to mailonline (http://www.dailymail.co.uk) in the report on August 31st, 2014, the performer got most of the attention, model, singer, and the nudie of host posts on the web site.Obviously be come from the result that hacker leaks the leakage of serving with the iCloud of apple.These occur that the photo (4chan is an images share forum) on lower 4chan is the 101 famous person's photos uploaded by its a certain user; Comprise Zhen Nifolaolunsi, A Liyanagenan ground, Victoria Jia Sitisi, with the private photos of Kate E Pudun.These photos were puted up in the week-night.It is said because the leak in iCloud allows the mobile phone of famous person by hacker attacks.Apple's refusal is made comments to this.The privacy of famous person is by serious infringement.
The better secret protection stored in cloud computing and cloud is definite needs.Number adds the secret protection that encapsulation technique will strengthen cloud computing and cloud storage.
Wavefront covers the application (No. PA 12/848953,13/938268,13/953715) be used in by technology in U.S. Patent application book above-mentioned.Compare with memory technology with the cloud computing of confucian orthodoxy, wavefront covers and can use less memory headroom by technology, to reach better redundancy, and higher reliability and viability.In addition, these technology also can be used in the integrality that monitoring stores data, and without the need to checking the of stored data own.Identical technology extends to the data flow on cloud; Comprise cloud video flowing and cloud audio stream.
Separately there are two subjects under discussion more needing to pay close attention to.First concerned operator provides safety and cryptographic storage service.But archives privacy is the archives encryption leaning against carrier server end.The operator of many operators still can access encipheror.So the archives privacy of client must rely on first personal integrity and the credibility of operator and server operator.It two is the concerns of residual right storing data about cloud; This subject under discussion is at present still at issue ardent.
The Patent right requirement intention of the present patent application book solves these subjects under discussion; Strengthen data cloud transmission and data cloud storage privacy and reliability.Many data beyond the clouds can be even that image or audio frequency are relevant.Because the data organizing cloud transport or storage can do preliminary treatment in client more, the data often organizing cloud transmission or cloud storage are one group and cover the data crossed by conversion process through wavefront.These cover by the data processed has not been the former data itself that can understand.So the number of advising in application seal up method client should be allowed to store the privacy of data to these clouds and reliability more confident, and these confidence are no longer only relied on the first personal integrity of operator and the concern of credibility.Seal up in method at number, known image, audio frequency, or multi-medium data all can be used as the next means storing as the reliable cloud data of expansion secret and transport of digital envelope.Most business opportunity all aims in game and amusement cloud communications applications.It can be used on the application tool of various digital commodities copyright management and reproduction right, protection wisdom property rights people." seal or marking 〞 will be bright spots in present patent application to seal up the number of technical certification through these multilayers number.
The number being used to illustrate in present patent application seals up by digital image/and solution adds encapsulation technique.The bitstream of other type can be easily combined and add encapsulation technique in proposed.
First concise and to the point introduction and summary " are write 〞 and " read the Implementation Modes of 〞 process." process writing 〞 utilizes a set of wavefront to cover to process many group initial data with conversion to comprise digital image as digital envelope and digital message, then by produces the data covered with after changing and is stored in high in the clouds." process reading 〞 covers the data after with conversion and to cover through a set of front wave solutions there is high in the clouds and reconstruct original multigroup numerical image with conversion.It is the writing method under some function restrictive condition that number is sealed up, and is also " write a set of subset of 〞 process.These numbers add the feature that the data of being honored as a queen all can have some original digital envelope.It should store some original image feature or other features.These function restrictive conditions be to ensure the feature of digital envelope there will be lower conversion after multi-group data in.It is a set of subset of read routine that digital solution is sealed up, and has the function adding the former digital message of the data reconstruction of being honored as a queen from number.
It is one group of application subset that wavefront covers that number is sealed up.The digital archives of many string inputs that wherein wavefront covers at least comprise a string data-message archives and a string selected digital envelope archives.What this wavefront covered simultaneously is configured in through all multichannel inputs and customizes weighted sum, must ensure that outward appearance that its multiple-channel output data manifest is for the image of human body natural's sense organ with selected digital envelope, video, or the outward appearance of audio format is identical.This kind of output archives be add be honored as a queen or have and embed the archives of message.The message embedded can cover purpose processor via corresponding front wave solutions, in destination, be honored as a queen archives and known former digital envelope of adding of receiving is carried out recovery and operates.
In a word, number seal up/solution seal up can through wavefront cover with and front wave solutions cover and realize with computing.It is the strong privacy and the redundancy that have increasing that wavefront covers the characteristic of the data after with running in data cloud transmission and cloud storage.On the other hand cover the redundancy with program application to wavefront, it is application in the opposite direction that data are sealed up.Data add that to be enclosed in application be reception user team for limited, enhance the digital archives privacy adding and be honored as a queen, but minimize or sacrifice completely the redundancy of the digital archives of message of being honored as a queen.
Summary of the invention
It is space digital system company (SDS) in the invention of satellite communication field that wavefront covers use/demultiplexing processing capacity; Wherein highly difficult demand comprises power of communications synthesis, fail safe, reliability and optimized algorithm.This cover wavefront covers use/solution and covers use technology, except embodying the communication construction utilizing multidimensional to transmit, also finds that this program can be used for surmounting the application of the outer other field of satellite communication field simultaneously.Wherein such application is that the transfer of data in high in the clouds and data store; Data keep close property, integrality and redundancy are the very important features of transfer of data/storage.Number is sealed up and is gone to seal up and can be used for transfer of data and data storage.They can be used for gift and game, as digital fortune cookie is done.In this application, usage data is transmitted as example by us, and as sent mail, the number of explanation seals up the concept sealed up with digital solution.Digital solution is sealed up and also be can be described as digital Kaifeng.
Number seals up/and invention that solution adds encapsulation technique is sent to destination about wavefront being covered the serial data after with conversion through cloud; But not send whole serial datas but the part sent after screening is covered and used serial data.Wavefront covers the serial data after with conversion also known as " covering with translation data string 〞, or claim " to cover and use serial data.〞 mono-group adds the data flow of being honored as a queen and is through wavefront and covers with conversion with one group of known serial data as a set of product of sealing up program.This organizes known serial data is exactly digital envelope, can be the personal images of transmit leg, is used for the data showing that the number who is sending is sealed up.Different digital envelopes also may be the different pictures of display sender mixed feelings, and the multi-group data simultaneously sent " can cover 〞 under the digital envelope of difference.Communication between kinsfolk, digital envelope may be that old digital home video is trimmed into new data flow.All kinsfolks have been friends in the past the new data stream become after video and editing.
Wavefront covers use/solution and covers and be used in number and seal up in application and can set other known data flow as detection, certification, and identification function signal.Wherein a set of is first seal up to deposit IP cloud method bag again and draw together ︰ and first many groups the first data are converted to multigroup numerical at transmitting terminal and add second data of being honored as a queen, it is characterized in that each group described add second data of being honored as a queen be through described all many groups the first data different weights and; And then described the second data adding different group of being honored as a queen are stored into IP high in the clouds via the Internet.Simultaneously also be connected to the different links that described storage adds the second data of being honored as a queen be stored in described transmitting terminal multiple.
Described data processing method, be included in transmitting terminal many groups the first data set and one group of given data are converted to multigroup numerical to add second data set of being honored as a queen, it is by the one group of weighted sum comprising all described first data sets that wherein said often group adds second data of being honored as a queen; With receiving terminal from described in some " cover 〞 is reduced into many groups the 3rd data set and described one group of given data collection adding the second data centralization of being honored as a queen, each wherein said group the 3rd data be all described numbers add many groups of second data sets of being honored as a queen different weights and.
A set of method for storing data at IP cloud, be included in transmitting terminal many groups the first data set is converted to multigroup numerical to add second data set of being honored as a queen, it is characterized in that described often group add be honored as a queen often to organize the second data are data images by comprising the different weights of all described first data sets and forming, each intensity of opening data unique look is mainly controlled by the first data described in a group.Unique look can be image, sound, and the further feature to human body sensor.
The invention relates to how to use in the field of digital copyright management and digitally to seal up/the technology sealed up of solution.Original figure archives are called as the mother matrix of archives.Other copies are all children's versions; It is that the number of digital envelope adds after encapsulation technique embedded in unique digital and unique identification archives and produces that every one's share of expenses for a joint undertaking female version is all through with mother matrix.The unique numeral identification relevant to certain one's share of expenses for a joint undertaking female version can only seal up process to recover through solution with mother matrix this while.Publish and issue archives and only have child release, mother matrix originally will by safe storage simultaneously.
Mathematically, a certain mother matrix archives A represents, its sub-version archives X of an x represents.These sub-version archives unique numeral identification archives Dx represents.Because it is a kind of linear process that number seals up network process, the relation of x version archives X and its mother matrix archives A relates to X=M*A+Dx, and wherein M is amplification coefficient and should be greater than 1.Another boundary condition of this relation to make the speech of the outward appearance of X to the sense of all human body opinion of natures almost identical with mother matrix.The message of Dx embeds and be hidden in the digital archives X of this sub-version, and be impossible recover to reduce Dx through X archives only separately.
The sub-version archives Y of another part y of mother matrix archives A represents.These sub-version archives unique numeral identification records application Dy represents.
In order to recover to reduce these sub-version archives unique numeral identification archives Dx from a sub-version archives X, the while that these archives X and its mother matrix archives A being required through the arithmetic operation of Dx=X-M*A or on an equal basis calculating process recover to reduce these numeral identification archives Dx.
Similar techniques can be extended for broadcast again provides appended message to spectators.First mother matrix broadcast archives can represent with A.Second broadcast archives B is one is embed or be hidden in sub-version broadcast archives X after sealing up process.Be a kind of linear process owing to sealing up process, the relation of sub-version broadcast files X and mother matrix broadcast files A is according to X=M*A+B, and wherein M is amplification coefficient, and should according to being greater than 1.Another boundary condition of this relation to make the speech of the outward appearance of X to the sense of all human body opinion of natures almost identical with mother matrix.B embeds and is hidden in the appended message archives in the digital archives X of this sub-version, and is impossible broadcast through letter the second broadcast archives that archives X recovers reduction only separately.In order to from then on recover to reduce the second broadcast archives B of appended message in the digital archives X of sub-version, this sub-version broadcast archives X and its first mother matrix broadcast archives A required while through B=X-M*A arithmetic operation or on an equal basis calculating process recover to reduce that this adds second and broadcasts archives B.
Broadcast may simultaneously through different channels again, in the different time through same channel, or in the different time through different channels.This technology can be used for live broadcasting satellite (DBS), wire cable, optical fiber, and the audio or video broadcast in other wireless or cable networks.The archives B embedded or hide can be different TV programme, and the data of running one's home of Set Top Box, are broadcast to the internet data of selected internet node, and/or other data.
Accompanying drawing explanation
Disclosed in the figures the present invention's schematically some embodiments.They do not set forth all embodiments.Other embodiment can use additionally or alternati.In order to save space or more effective retouching tells description example, a lot of abridged details may be apparent or unnecessary.On the contrary, some embodiments can be put into practice when not having all details be disclosed.Ref. No. identical in addition or reference designator there will be in lower different accompanying drawing, and they can refer to same or analogous parts or step.
Invention in this application, can more fully be appreciated that from following description when with accompanying drawing 1 with when reading application, its accompanying drawing should be considered to illustrative, instead of as the restriction of application.Accompanying drawing is not necessarily drawn in proportion, but focuses on principle of the present invention.
Fig. 1 illustrates that block diagram sealed up by the digital envelope of a width to a certain group of digital archives according to an embodiment of the invention, that includes and cover purpose processor through one group of 2 to 2 wavefront and this is organized digital archives embed in one group of digital envelope, right marquis selects one group and is sent to destination through high in the clouds covering during purpose processor two groups exports, and opens digital envelope in destination and reclaim the one group of former digital file data covered in digital envelope.Digital envelope is from being all that selected in the known digital envelope of many groups candidate one group is digital to sender and recipient, is also to the transmit leg in source and a set of digital transmission mode the recipient in destination.Sealing up of one group of digital envelope is conciliate to the process sealed up and be also hereinafter referred to as and seal up and break a seal.
Figure 1A shows the digital envelope of a row 6 groups of candidates according to an embodiment of the invention.
Figure 1B shows another according to embodiments of the invention and arranges the digital envelope of 5 groups of candidates.
Fig. 2 shows one group of image according to some embodiments of the present invention, and they copy from U.S. Patent Application No. 13/953715 (PA publication US2014-0081989A1) Fig. 5 D; Also prove through calculator simulation the feasibility that image pretends simultaneously.Four width images of first row are imported into one group of 4 to 4 wavefront and cover purpose processor.This width first row " horse race 〞 image is chosen as the image of digital camouflage.Effectively, four width images in a second column all this width horse race figure on quilt cover.
Fig. 3 illustrates when the receiver in destination is according to some embodiments of the present invention; It is for cannot get at original digital envelope user can via one group 2 to 2 wavefront cover with device seal up/solution seals up the block diagram of process.It is a set of block diagram being similar to Fig. 1, and sender is covered to export with device two-way through transmission and delivered to receiver via high in the clouds, then through one group 2 to 2 front wave solutions cover and do the original digital envelope of reduction and the digital message of embedding with device.
Fig. 4 illustrates the two block diagrams of sealing up according to some embodiments of the present invention.
Fig. 5 illustrates according to the two block diagram of sealing up of the solution of some embodiments of the present invention.
Fig. 6 illustrates and embeds one group digital message in via covering before higher order wave with for one group of digital message according to some embodiments of the present invention; The block diagram that one panel height rank are sealed up.
Fig. 7 illustrates and covers digital message with restoring embedding from one group of bitstream of being honored as a queen according to some embodiments of the present invention through high-order front wave solutions; The block diagram that one width higher-order solutions is sealed up.
Fig. 8 illustrates according to some embodiments of the present invention through covering before higher order wave with performing the two block diagrams of sealing up embedding digital message.
Fig. 9 illustrates and to cover with reducing the two block diagram of sealing up of solution embedding digital message from two bitstreams of being honored as a queen via high-order front wave solutions according to some embodiments of the present invention.
Figure 10 illustrates that embodiments more according to the present invention are covered to go here and there with generation 4 through one group of 4 to 4 wavefront and available seals up data flow, then the block diagram of sealing up selecting 3 strings to send through high in the clouds.
Figure 11 illustrates to cover through one group of 4 to 4 front wave solutions according to some embodiments of the present invention and seals up block diagram with wantonly two strings in the three string bitstreams got off from high in the clouds being used for reduce the solution of the digital message of embedding.
Figure 12 shows to cover through one group of 4 to 4 front wave solutions according to some embodiments of the present invention and seals up block diagram with wantonly two strings in the three string bitstreams got off from high in the clouds being used for reduce another solution of the digital message of embedding.
Figure 13 shows and seals up block diagram through covering through one group of 4 to 4 front wave solutions with the three string bitstreams got off from high in the clouds being used for reduce the solution embedding digital message according to some embodiments of the present invention.
Figure 14 shows and seals up block diagram according to covering through one group of 4 to 4 front wave solutions in some embodiments of the present invention with the three string bitstreams got off from high in the clouds being used for reduce another solution embedding digital message.
Figure 15 show according in embodiments more of the present invention through one group of 2 to 2 wavefront cover with and another group 4 to 4 wavefront cover and only have one group to seal up block diagram through high in the clouds the two of bitstream that are honored as a queen for producing.
Figure 16 show according in embodiments more of the present invention through one group of 2 to 2 front wave solutions cover with and another group 4 to 4 front wave solutions cover with and only need reduce that the solution that embeds digital message is two seals up block diagram with one group through high in the clouds bitstream of being honored as a queen.
Be according to some embodiments of the present invention shown in Figure 17 A, the number being applied to digital copyright management (DRM) seals up block diagram; Through the unique identification picture being embedded in a digital archives/mute of sub-version, the sub-version archives/mute being then stored in cloud or issuing respectively.,
Shown in Figure 17 B is that the solution of the film image stored according to some embodiments of the present invention logarithmic code archives or cloud seals up block diagram; Be used for recovering the unique identification picture or the mark archives that are embedded in the digital archives/mute of sub-version.
Figure 18 A shows and in two book version broadcast figure archives, seals up according to some embodiments of the present invention the identical appended message embedded with different mode via number, then through beyond the clouds or the application program block diagram of other forms of broadcast/broadcast again.
Figure 18 B shows and after receiving two book version broadcast figure archives of broadcast/broadcast again, through being sealed up by digital solution, the identical appended message embedded with different mode is recovered reduce application program block diagram according to some embodiments of the present invention.
Figure 19 shows according to the simple block diagram of picture-storage captured by smart phone in cloud in some embodiments of the present invention.
Figure 19 A shows to add via number according to picture captured by smart phone in some embodiments of the present invention and is honored as a queen, and is stored in the block diagram in cloud.
Figure 19 B shows and makees to being stored in high in the clouds image the block diagram that digital solution seals up process according in some embodiments of the present invention.
Figure 20 A shows to add via number according to picture captured by smart phone in some embodiments of the present invention and is honored as a queen, and is stored in another block diagram in cloud.
Figure 20 B shows and makees to being stored in high in the clouds image another block diagram that digital solution seals up process according in some embodiments of the present invention.
Description of reference numerals: 110-telecommunication operators concept; 130-preliminary treatment; 010-high in the clouds; 140-reprocessing; 180-candidate envelope document; 180-1-candidate envelope first subdocument; 180-2-candidate envelope second subdocument; 521-first row; 522-secondary series; 523-the 3rd arranges; 130-1-first preliminary treatment; 130-2-second preliminary treatment; 140-1-first reprocessing; 140-2-second reprocessing; 630-preliminary treatment; 640-reprocessing; 1710-DRM framework; 1800-mother matrix film; The sub-version film of 2000-; 1790-solution seals up process framework; 1901-smart mobile phone camera; The local loose-leaf binder of 1902-; The local loose-leaf binder of 1911-automatic synchronization; 1921-smart mobile phone cloud interface.
Embodiment
When following description is read together with alterations, can understand aspect of the present invention more fully, the character of these alterations should be considered as illustrative and nonrestrictive.These are graphic may not draw in proportion, but emphasizes principle of the present invention.
Now illustrative embodiment is described.In addition or can substitute and use other embodiments.For saving space or more effectively presenting, apparent or unnecessary details can be omitted.On the contrary, some embodiments can be implemented and not disclose all details.
The present invention utilizes the System and method for of a set of distribution type transmission path of having the M to-M wavefront of built-in redundancy to cover to produce by technology or storage; Wherein M >=2 also must be integers.Be connected on this wavefront to cover and comprise N string message data flow and extra M-N with the M string data stream of input port and go here and there known file data stream; Wherein N >=1 is also integer.These M go here and there independently input traffic and are covered by wavefront and covering with converting to the wavefront component (wfcs) exported with the M string in field.M' string in only having M string to export will be used to data cloud transmission and/or data cloud stores, and wherein while of M-NM'M, M' is an integer.
In addition, any a string in given data archive stream can be chosen as digital transmission envelope and cover being used for one group of M-to-M wavefront by the part sealing up process and process.
Suitable weight or be weighted to many strings input that one group of M to-M wavefront covers purpose processor be select certain string to be input as " carrier 〞 transports the effective ways of embedding mail.Its M has at least a string meeting to be chosen to be the data archival adding and be honored as a queen in going here and there and exporting.It " carrier 〞 is exactly the digital envelope be weighted, and simultaneously for human body, it should have identical outward appearance with former digital envelope.These identical outward appearances comprise unique feature with being easy to distinguish with other archives from data archival.These functions can be pictures intuitively, video, audio music, text, or multi-medium file.
Have at least a string data flow of being honored as a queen that adds will be sent to destination via high in the clouds.This adds the data flow of being honored as a queen may be shown as digital image, video clipping, music excerpt, recording, or digital cartoon in cloud transport or cloud store.As the function of the envelope of routine, these digital envelopes can transmit context and embed mail, the author of the mood preview of intention and author, or from the message that embedded mail transmits.
For human organ, former digital envelope and add bitstream of being honored as a queen and should have identical outward appearance, these outward appearance identifications and differentiation are by human auditory's organ, the organs of vision, or two organoids simultaneously.
Receiver in destination should utilize a set of preprocessor, as front wave solutions is multiplexing, has rebuild the message data embedded under the help of former digital envelope., the known archives of former digital envelope necessarily receiver, or the serial data can known from other channels.
The present invention through wavefront cover with and cloud transmission, as shown in Figure 1, to disclose sealing up/solution seals up the management philosophy of application, method, and implementation process; Similar technology can be applied to video flowing, guarantees data storage service privacy, guarantees file transfer safety, and through other application programs of Internet cloud.Embodiments of the invention comprise three important fields, and comprise (1) pre-treatment in client, namely above-mentioned wavefront covers use, and the digital envelope utilizing to select is sealed up a number of packages code mail; (2) there being the high in the clouds embedding the bitstream of being honored as a queen of mail and serve, and (3) client reprocessing, namely above-mentioned front wave solutions covers use, seals up the former digital mail reducing and cover in digital envelope through solution.We will lift sole user for example explanation preliminary treatment and the operating concept of reprocessing.
In principle, pre-treatment and reprocessing are all carry out at user segment, and carry out at the equipment of client.Cloud is stored, these seal up/and solution seals up and also can carry out in the storage facility of operator and flow process.Operator can by combined data collection through high in the clouds telecommunication network distributed store in different cloud storage facilities.
Embodiment 1
Fig. 1 describes the telecommunication operators concept 110 between the transmit leg in source and the recipient in destination.Transmission sender utilizes a set of 2 to 2 wavefront in preliminary treatment 130 to cover and seals up process with device, and one group of message data S (t) is embedded in selected digital envelope E5 (t).The data of input are English phrase with Word form " OpenSesame 〞 and write as translator of Chinese " open sesame 〞 and the relevant pronunciation symbol of 4 Chinese characters.Selected digital envelope is Chinese artist, Xu Beihong, a width famous painting " digital picture of horse race 〞 in the 1900's initial stage works.There are 11 digital envelopes known to all users in community in candidate's envelope literary composition File 180 in a certain user community in addition; Comprise transmit leg and the recipient of this envelope letter.Have wavefront in comfortable preliminary treatment 130 to cover to export with device two-way; Bitstream Es (t) of being honored as a queen in high in the clouds will be served in one tunnel, and another road is grounded.Es (t) be from two input data archivals; S (t) and E5 (t), the result of individual element process.Wavefront covers with the aunt's conversion of a set of 2*2 sea can be utilized to make device in place.The amplitude of S (t) and E5 (t) is by by suitable, " adjustment 〞 makes the organ of the outward appearance of Es (t) and E5 (t) for the mankind identical; As hashed out in the open number 2014/0081989A1 of a U.S. Patent application book.In this case, in Es (t) " horse race 〞 schemes the " flipped image of horse race 〞 digital pictures same in seemingly E5 (t).
To wavefront cover with after, Es (t) is a string data flow of being honored as a queen, and it is also via IP high in the clouds 010 or unique archives of destination of claiming IP network to be sent to.Es (t) outward appearance is almost identical on human vision sense organ with the galloping horse in the famous image of E5 (t).In destination, receive to cover through a set of 2*2 front wave solutions in reprocessing 140 and restore with device or equal processor and former digital envelope the message covered in digital envelope; " English short sentence of open sesame 〞, Chinese short sentence and Chinese pronunciations write on the embedded letter of China; Only when being supplied to receiver again.Three Fen ︰ (1) preliminary treatment 130 be discussed below respectively drawn together by whole operating process handbag, (2) IP high in the clouds 010 transmission channel, and the reprocessing 140 that (3) below clouds swim.
Preliminary treatment 130 ︰
In the preliminary treatment 130 that mail is sealed up or message is sealed up, can cover with a set of 2 to 2 wavefront and process with device.It has two string inputs; A string is mail data or message data S (t), and another string is that selected digital envelope or number seal up string E5 (t).Wavefront covers with also there being two-way to export serial data after conversion, i.e. Es (t) and Ed (t), Qi Zhong ︰
Es(t)=S(t)+am*E5(t)(1-1)
Ed(t)=S(t)+am*E5(t),(1-2)
Here am>>1 is the amplification coefficient relevant to image, is usually set between 5 and 30.
In one group of 2 extra large aunt's matrix (HM) to 2, all matrix elements are all " 1 〞 or "-1 〞.This group matrix can be selected as conversion that a set of 2 to 2 wavefront cover or computing.Formula (1-1) and (1-2) can be write as matrix form
O=HM*I(2)
Here: O=[O1, O2] T=[Es (t), Ed (t)] T (2-1)
H M = 1 - 1 - - - ( 2 - 2 )
I=[I1,I2]T=[S(t),am*E5(t)]T(2-3)
Wavefront covers and is commonly called " section (slice) 〞 and its output port is known as wavefront assembly (wfc) with the port of device.Two strings input data set S1 (t) and am*E5 (t) are connected respectively to described input port, namely cover the section 1 with device at wavefront, section 2.The serial data of another two string outputs simultaneously, i.e. O1-O2, is connected to wavefront in preliminary treatment 130 respectively and covers the output port using device, i.e. wfc1-wfc2.
Usually cover in purpose processor at a set of 2 to 2 wavefront and can produce 2 groups of orthogonal wavefront vectors or WFV.Let us define one group of wave-front conversion coefficient wjk coefficient be used for being described in wavefront in preliminary treatment 130 cover with device be distributed in jth row and k row 2 dimension output vectors.Namely O1, O2 cover in front wave solutions and tie up element ports wfc1-wfc2 with 2 of device, are defined as one group of bivector.They are mutually orthogonal.Wavefront covers two groups of WFVs Shi ︰ with device 101
WFV1=[w11,w21]T=[1,-1]T,(3-1)
WFV2=[w21,w22]T=[1,1]T,(3-2)
S (t) and E5 (t) be utilize be connected respectively to wavefront in preliminary treatment 130 cover with device two input ports could " additional 〞 be front upper to two groups of quadrature wave.All represent with two groups of wavefront vectors (WFVs) before these two groups of quadrature wave.Two pieces component in each wavefront vector (WFV) all relates to the linear combination of input and output port number or (space) sequence, but it is totally independent of outside described input and output data set.
Wavefront covers and one string data can be divided into data block with the mathematical operation of conversion, then the some bytes in different pieces of information block as digital sample, and then carries out many groups and enter and Numeral operation that many groups go out.It is alignment that many groups subnumber code stream of all parallel inputs must cover the sample after determining the sampling of different subnumber code stream with conversion inputs mouth at wavefront.Each byte of data can be considered as one-bit digital sampling; Also the X of a serial data byte can be considered as one-bit digital sampling.For example in the mathematical operation of certain a string bitstream, we have selected X=7, just mean that in this string bitstream, every 7 bytes are covered with being regarded as one-bit digital sampling in the mathematical operation changed at wavefront., will be regarded as block digital number yardage and calculate, wavefront covers with conversion.Two strings, 7 bytes are that the bitstream of digital sample can receive two respective inputs that a set of 2 to 2 wavefront cover use device.But this wavefront covers and X+1 byte must be adopted to be that the size unit of sampling is to avoid overflow and the underflow problem of two-way output by two corresponding output end of device.In this case, the translation operation that the bitstream that exports of often going here and there all needs by 8 bytes.Relative to the operational data size of 7 bytes, this 8 byte operation output form result can produce the overhead of 12.5%.In addition in various embodiments, we can select the sample size of 99 bytes for mathematical operation, i.e. the operational data size of X=99 byte, can reduce the overhead of computing to 1%.
Cover with in the linear combination of conversion or the computing of weighted sum at wavefront, also have the selection of other data blocks.For example retaining the imaging in unique function application for some, is that the arithmetic operation of unit may be prior with pixel.Also may by a row or a row pixel as storing effective usage data block of computing.
In the present embodiment, only export Zhong mono-tunnel with two-way and be sent to destination.Predetermined recipient must have, and " more multiple message 〞, again to recover to cover on the digital message of embedding or digital mail of being honored as a queen in bitstream; The English short sentence of Word form " open sesame 〞 and write as translator of Chinese and the pronunciation of 4 words." more multiple message 〞 refers to selected former digital envelope to this group.If two-way exports data can be passed to receiver, the mail of embedding and selected former digital envelope can in destination through this two paths of data by again recovering independently without the need to additional any known message.
Generally speaking, cover many or the many string output streams of sealing up with conversion or multilayer from the wavefront of more high-order, these bitstreams of being honored as a queen at least will have one or a string will be sent to destination through IP high in the clouds 010.Embedding mail covers on these strings and is honored as a queen in bitstream.More the wavefront of high-order cover with conversion be commonly called the wavefront of N to N cover with conversion; N is wherein normally between 4 and 5000.The quantity of the destination that will be sent to should be limited in and be less than NCR string and to be honored as a queen the string quantity of bitstream.NCR is an integer less than N always.Under the condition without any other messages known, NCR string be honored as a queen bitstream not enough independent messages again organize structure and cover on NCR and go here and there the digital message of being honored as a queen in bitstream.
High in the clouds 010 ︰
Only have a string wavefront to cover and deliver to destination with archives from source through high in the clouds 010.Original digital envelope is all known digital archives for the transmit leg in source with destination recipient.Therefore, giving Es (t), to transmit required channel width beyond the clouds roughly identical with the channel width needed for the message S (t) only transmitting embedding.Give Es (t) at that and the expense sealing up process be can be considered for the difference that S (t) transmits required frequency band beyond the clouds.
Reprocessing 140 ︰
Reprocessing 140 is for from the data after the retrieval of high in the clouds, comprises and covers purpose processor by a set of front wave solutions, the data received are converted to the former data archival embedding or hide after this retrieval, and then by the output of this former data archival.Original digital envelope archives E5 (t) is that reprocessing 140 inputs one of data, also will be input to this cover front wave solutions and cover in purpose processor.After the retrieval of high in the clouds, the data that receive should be that the wavefront in preexist high in the clouds covers and uses rear data.If not contaminated, be substantially equal to previous wavefront in preliminary treatment 130 and cover with output data set corresponding after process, Es (t).Therefore this former data archival exported can give Es (t) or give Es'(t) represent.Similarly, the embedding converted to or hiding former data archival equal input data S (t), therefore can be described as S (t) or S'(t).
According to formula (1-1); Can cover through received wavefront and reduce with rear data Es (t) and digital envelope E5 (t) coming the hidden message data being embedded in and being honored as a queen in number stream;
S(t)=Es(t)-am*E5(t)(4)
Herein; Am parameter can be determined through optimum experimental or through known digital archive set.Therefore, a set of 2 can also be re-built according to formula (1-2) and formula (4) and the second string output lacked in use is covered to 2 wavefront
Ed(t)=-Es(t)+2*am*E5(t)(5)
One group of 2 to 2 extra large aunt's matrix element is that " 1 〞 or matrix element are that "-1 〞 is likely chosen as a set of 2 to 2 front wave solutions and covers the computing using device.These relations can be write out with matrix form;
SM=HM*D(6)
Qi Zhong ︰ D=[D1, D2] t=[Es (t), Ed (t)] t(6-1)
SM=[S(t),amE5(t)] T(6-2)
HM is that in formula (2-2) one group 2 is to 2 extra large aunt's matrixes.
It is in reprocessing 140 that front wave solutions is covered with device.It input port be called as wavefront component (wfcs), i.e. wfc1 and wfc2, and its output port is called as section (slices), i.e. slice1 and slice2 or section 1 and section 2.This front wave solutions in reprocessing 140 is covered with in device example, and 2 strings of input are digital, i.e. Es (t) and Ed (t), by the input port wfc1-wfc2 dividing other to be connected to it.Recombinate reclaim message number string, S1 (t) be can from it first output port export.Under normal circumstances, in this application program of reprocessing 140, front wave solutions is covered with the second output port of device will be ground connection.
As selection, cover from reprocessing 140 front wave solutions and also can be used for rebuilding another part of former digital envelope with the second output of device.This corresponding copy can compare with known digital envelope archives, can receive a good integrity metrics of message data as inspection institute.If comparative result shows this two pieces, digital envelope is not identical digital archives, and this has been compromised with regard to the digital string of being honored as a queen received by representing in transmitting procedure.That is cover on be honored as a queen the message data in digital string and the message data after rebuilding all likely to be compromised.
Figure 1A and Figure 1B respectively depict 6 at the sub civilian File 180-1 and 5 of candidate's envelope the one at the digital envelope of the sub civilian File 180-2 candidate of candidate's envelope the 2nd.E5 (t) is selected for the example at Fig. 1.At the common known digital archives of E11 (t) selected by the personal communication between a pair sender and recipient of Figure 1B.
Fig. 2 is at the duplicate of U.S. Patent Application No. 13/953715 with publication number 20140081989 Fig. 5 D.It is that wavefront covers use/solution and covers with respectively as the example to a pre-treatment in cloud data-storage applications program and reprocessing, is intended to illustrate to cover with the image presented being stored into during distributed cloud stores through the wavefront of a set of 4-to-4.Wavefront covers use/solution and covers with doing digital operation through any one group of orthogonal matrix or one group of non-orthonormal matrix, as long as its inverse matrix exists.First row 521 in this figure shows the image of original input, secondary series 522 show wavefront cover with after the image that stores again or wavefront covers the image be transferred with rear wait, the 3rd row 523 show destination through solution cover with after the image that restores and recover.Four images in the row 521 of top are input to the four width images that the wavefront of a set of 4-to-4 covers use device; First 3 is clap in New York Bronx Zoo in the recent period, the first, the second and the three photo, respectively according to be one " hawk 〞 is indicate with A1.png, one " brave 〞 indicates, and one " hoary hair animal 〞 indicates.4th is that part classics is first born in " the galloping horse 〞 drawn by nineteen thirty by the sad letter of famous Chinese artist Xu." galloping horse 〞 is indicate with A4.png.
Let us supposes that one group of 4 to 4 extra large aunt is transformed to wavefront and covers and use matrix.
That 4 wavefront on secondary series 522 cover with rear archives Ov, Ox, Oy, and Oz has camouflage effectiveness; This be original 4 input pictures cover through wavefront create with conversion deposit various storage data time different weight of having divided other to be added." the A1 image that galloping horse 〞 draws covers at 4 wavefront and is used as camouflage by feature more dominant in rear archives, and covering by image pixel intensities after conversion is utilize under the condition of the A1 image of weighting through lower column matrix fortune calculation ︰ in order to ensure
O 1 O 2 O 3 O 4 = + 1 + 1 + 1 + 1 + 1 - 1 + 1 - 1 + 1 + 1 - 1 - 1 + 1 - 1 - 1 + 1 a m * . A 2 A 3 A 4 - - - ( 7 )
Wherein am>1 and be normally set to be greater than 10.Also assume that the size of the grid of the pixel in 4 input pictures is completely equal.When depending on camouflage test, the weight of weighting selects the image that can be applicable to any input.In addition, formula (7) also can Xie Cheng ︰ equivalently
O 1 O 2 O 3 O 4 = + a m + 1 + 1 + 1 + a m - 1 + 1 - 1 + a m + 1 - 1 - 1 + a m - 1 - 1 + 1 . . . . - - - ( 7 - 1 )
Therefore, Xu Beihong " galloping horse 〞 has been drawn as to participate in covering and has occupied an leading position with in 4 images of conversion, and the image of galloping horse also occurs that lower all 4 wavefront cover with in the data after changing, i.e. Ov, Ox, Oy, and Oz.Its difference be in the galloping horse image of showing up along with different output images shows various different brightness settings.
For the archival image of being honored as a queen or the outward appearance outward appearance relative to described digital envelope, other image operation is as " turn-over, rotates, zoom out, or the 〞 that furthers must cover with conversion pre-treatment at wavefront.
For avoiding data from overflow and underflow in image simulation computing, it is about original image A1-A4 or 2 ~ 3 times of sizes of restoring rear image (Sv, Sx, Sy, Sz) that data (Ov, Ox, Oy, the Oz) archives after each wavefront covers use are equipped with.
The image that image in 3rd row is recombinated through a set of reading process." process reading 〞 also has two steps for this.The first step comprises 4 wavefront that download is deposited respectively from cloud and covers the archives after using.Second step is through the multiplexing conversion of front wave solutions and 4 wavefront is covered the archives after using, as Ov, Ox, Oy, and Oz, convert four archives Sv reclaiming or reproduce to, Sx, Sy, and Sz.If the Ov deposited in cloud, Ox, Oy, and Oz does not have contaminated, these four the digital archives reproduced should cover with front picture A1-A4 almost identical with wavefront.Four are reclaimed or reproduce balanced image file and then can pass through solution equilibrium treatment, convert 4 images that are that reclaim or reconstruct to and are substantially equivalent to four each other original image A1 ~ A4.
Suppose all four archives Ov, Ox, Oy, and Oz can use, front wave solutions is covered should to abide by with conversion and is followed ︰
||S||=||WD||.(8)
Wherein, || WDmx||||WMux||=. (8-1)
More particularly, each image pixel intensities in each part image of the image (Sv, Sx, Sy, Sz) of 4 reconstruct is the result of the linear combination of one group of each image generic pixel brightness.This generic pixel refers to the grid covering the identical row and column of the image file after using at four wavefront.Such as, at Sv, Sx, Sy, and Sz recombinates or in Recovery image, single image pixel intensities of the grid of the 41st row and the 51st row covers with rear image Ov, Ox by 4 wavefront, Oy, and single image pixel intensities that in Oz, the 41st row the 51st of every part arranges is multiplied by the weighted sum of respective weight parameter.
For sealing up in application, cover at the 4 string wavefront in source that to only have a string with rear archives be sent to destination by transmit leg through cloud.As in an example, A1 can be that message data are passed to destination through high in the clouds, and A4 is selected digital envelope.All the known number that priori was tested for transmit leg and the recipient A2 in destination, A3 and A4.
Any one in 4 archives of secondary series 522 all can be used as digital string of being honored as a queen, and it can pass through high in the clouds to pass on the digital message (A1) embedded in it.The number of being honored as a queen that let us selects Ov to be transported to destination is gone here and there or is called the data archival adding and be honored as a queen.Obviously, adding the data archival Ov be honored as a queen, to manifest Ah be an image covering a dry goods of running.This image is identical with the image of the galloping horse on digital envelope A4 substantially.To be covered with the digital message of A1 in the data archival Ov that the digital string or add of being honored as a queen is honored as a queen, to be also one and to be sent to the archives of destination through high in the clouds.
We no longer repeat all mathematical details to image procossing described in this width chart here.Total, we utilize above-mentioned identical mathematical operation for sealing up for digital message, or embedding will via the mail transported in cloud in digital envelope.We to show wavefront cover be used in seal up/solution seals up two key characters of application.After sealing up digital envelope (A4) chosen in processing procedure;
1. selected message A1 is embedded in selected sealing up in data (Ov).Seal up data or title to be honored as a queen number, digital string of being honored as a queen, data of being honored as a queen.
2., for human sensory, original digital envelope A4 goes here and there with number of being honored as a queen or data archival of being honored as a queen (Ov) should manifest the identical feature of appearance, and these same characteristic features can clearly be told from other digital archives (A2, A3 and A1).
The digital archives that A2 and A3 may become checking or identify.
In another kind of scheme, wherein A1 is set as that digital message will be sent to the data of destination via high in the clouds, A2 and A3 can be used to verify, and A4 is selected digital envelope, Ov and Oz is that two strings will be sent to the digital string of being honored as a queen in high in the clouds.In destination, first reader has taken three event data A2, A3, and the digital archives of A4, so only need to receive, two strings are honored as a queen in digital string Ov or Oz a stringly can recover to reduce the digital message image being embedded in and being honored as a queen in digital string, Sv.For First Reader, the wavefront noticing and use redundancy covers with reflection process, and it is very important for being concerned about this point.The digital message image Sv recovering reduction should be identical with former digital message image A1.On the other hand, second reader do not take be chosen to be digital envelope " the digital archives of galloping horse 〞 A4; but the original digital archives of existing another two pieces archives A2 and A3; download through high in the clouds two strings come to be honored as a queen digital string Ov and Oz so necessarily receive simultaneously, could recover to recover be embedded in number of being honored as a queen go here and there in digital message image A1.For the second reader, the digital string of being honored as a queen that he also can utilize this two string to download recovers to reduce the digital archives of digital envelope, seals up process prepare for following solution.It is also very important for being concerned about this point.
For the third situation, wherein A1, A2 and A3 are the three number of packages code archives (A1 is digital message) that will be sent to destination through cloud, and A4 is as the digital envelope of selection, and Ov, Ox, Oz are that three strings being sent to high in the clouds are honored as a queen digital string.In destination, in the former digital archives that first reader has taken, only have digital envelope A4, be honored as a queen after digital string Ov, Ox, Oz so need to receive all 3 strings from high in the clouds, could recover to recover be embedded in number of being honored as a queen go here and there in digital message image, Sv.Notice, covering First Reader wavefront does not here have redundancy with reflection process, and this point is very important.On the other hand, digital envelope " galloping horse 〞 A4 is not had in the former digital archives that the second reader has taken.He can download three strings and to be honored as a queen digital string Ov, Ox, Oz but he cannot rebuild the message image A1 of embedding from high in the clouds.
For the 4th kind of situation, wherein A1, A2 and A3 are the three number of packages code archives (A1 is digital message) that will be sent to destination through cloud is that data set is sent to destination through cloud, A4 is as selecting digital envelope, Ov, Ox, Oy, Oz are that four strings being sent to high in the clouds are honored as a queen digital string.In destination, in the former digital archives that first reader has taken, only has digital envelope A4, so only need to be honored as a queen digital string Ov from high in the clouds four string, receive any 3 strings in Ox, Oy, Oz to be honored as a queen digital string, just can recover the digital message image being embedded in and being honored as a queen in digital string, Sv.Cover First Reader wavefront here and have redundancy with reflection process, this point is very important.On the other hand, digital envelope " galloping horse 〞 A4 is not had in the former digital archives that the second reader has taken.He must download three strings and to be honored as a queen digital string Ov, Ox, Oz but he cannot rebuild the message image A1 of embedding from high in the clouds.On the other hand, the second reader do not possess numeral " horse 〞 A4 and he must be transmitted through cloud and download all four strings and be honored as a queen after digital string and could rebuild A1 in the image of embedding.Cover the second reader wavefront here and do not have redundancy with reflection process, this point is very important.
Embodiment 2
Fig. 3 depicts and uses above-mentioned wavefront to cover by technology be two groups of operating concepts of sealing up digital message.Have three Bu Fen ︰ (1) preliminary treatment 130 or seal up, (2) transmit through high in the clouds 010, and (3) reprocessing 140 or solution are sealed up or break a seal.Almost identical compared with overlapping operating concept with that shown in Fig. 1.The technology of Fig. 3 function sends the receiver that a string digital message data S (t) and a string former digital envelope E5 (t) are specified to a group.Two strings output signal Es (t) of preliminary treatment 130 and Ed (t) can be sent to receiving terminal.
Message two to be serially added in data archival Es (t) of being honored as a queen and Ed (t) by being embedded in of secret first, then is sent to the receiver in destination by source.Receiver utilizes this two to serially add the digital message and former digital envelope that the data archival recovery and rebuilding of being honored as a queen embeds.This former digital envelope can be used to the subsequent transmission between transmitter and receiver.The transmit leg of cloud communication channel both sides and recipient are once digital envelope data becomes known, transmit leg only need two string wavefront cover with after archives in a string, or Es (t) or Ed (t) be sent to high in the clouds, recipient just can recovery and rebuilding embed digital message S (t).
Fig. 3 provides a kind of method and sends one group of digital message data and a string original digital envelope data to desired setting receiver simultaneously.Two outputs of preliminary treatment 130, Es (t) sends to receiver with the signal of Ed (t) simultaneously, can be used for reconstructing the digital message data embedded, and the former data of this digital envelope.
Embodiment 3
Fig. 4 illustrates with sealing up through two-layer order, using a set of 2 to 2 wavefront to cover is set as that one group of message data does two transmission (Tx) management philosophy sealed up.It illustrates in Fig. 1 first two sections of three sections of settings. establish and determine ︰ (1) preliminary treatment 130 or seal up process for three sections in Fig. 1, (2) transmit through high in the clouds 010, and (3) reprocessing 140 or solution seal up process or Kaifeng process 140.
The process of sealing up in two cover Fig. 4 is had to be cascaded herein., it is all process identical with sealing up shown in Fig. 1 that every suit seals up process.At described ground floor preliminary treatment 130-1, there are two inputs; S (t) and E1 (t) and output x (t).Second output is grounded.S (t) is through digital message that high in the clouds is delivered to destination and comprises an English phrase " open sesame 〞 and its Chinese Translators' Journal diacritic.E1 (t) is a digital envelope in selected from candidate's envelope Wen File 180, and one of the function of first output x (t) of ground floor preliminary treatment 130-1 is substantially identical for human sensory with the outward appearance of E1 (t).His the second output has been grounded.
At described second preliminary treatment 130-2, also have in two inputs, x (t) is with E5 (t) and only have one to export Es (t).E5 (t) be also select from candidate's envelope Wen File 180, as selected outer digital envelope, one of the function of first output of the second preliminary treatment 130-2 be Es (t) outward appearance and E5 (t) substantially identical for human sensory in appearance.
There are not " the English short sentence of open sesame 〞 and its four word translator of Chinese and diacritics in appearance for digital archives Es (t) of transmitting.Transmit under the condition of the E1 (t) suitably selected or E5 (t) bandwidth of being honored as a queen needed for digital archives Es (t) should with only send through cloud S (t) time close to identical.
In other embodiments, various image processing step in order to different orders can first for digital envelope, as reduced the dynamic range in single pixel, or cover with front for strengthening the verifiability and the property identified of sealing up archives at wavefront simply.The digital image that many image procossing are in advance crossed can be stored in digital envelope candidate archives alternatively digital envelope.Certainly, these extra first process can comprise in FIG as a part for preliminary treatment 130.What these were extra anticipate also be used in that Fig. 4 is two and seal up in arbitrary cover comprise the first preliminary treatment 130-1 or the second preliminary treatment 130-2, or to realize through two cover these the first preliminary treatment 130-1 and this second preliminary treatment 130-2.
Fig. 5 illustrates and uses two-layer 2 to cover by method sequentially via the two operating concept of sealing up digital message of receiver (Rx) setting solution 2 front wave solutions.It is described that last two sections of three section operation in Fig. 1.Three section operation in Fig. 1 is (1) preliminary treatment 130 respectively or seals up process, and (2) transmit through high in the clouds 010, and (3) reprocessing 140 or solution seal up process or Kaifeng process 140.
The series connection that operating concept seals up process by two string solutions formed.Often a string be seal up with going shown in Fig. 1 process identical.To open in first set reprocessing 140-1 described in outer digital envelope, two inputs are had to tie into Es (t) and E5 (t) number string respectively; X (t) number string is exported with output.Second output is grounded.Es (t) is the digital data archives received at the receiver of destination.These digital archives contain the digital message of embedding.E5 (t) is known digital envelope archives.It is the outer digital envelope that the candidate's envelope Wen File 180 approved from transmit leg and recipient selects.
The digital archives that first string input Es (t) a group receives in receiver desired by destination, and unique output of the second preliminary treatment 130-2 described in Fig. 4 should be substantially equal to.Its outward appearance, for human sensory, should be identical with the outward appearance of E5 (t).Similarly for human sensory, a string x (t) serial data that first output of the first reprocessing 140-1 exports and its second output has been grounded.Process 140-2 in the second rear and also have two inputs, access a string x (t) serial data and a string E1 (t) serial data respectively.The function outward appearance of x (t) substantially should identical with E1 (t) outward appearance.E1 (t) is the digital envelope of selected internal layer, is that the candidate's envelope Wen File 180 approved from transmit leg and recipient selects.Processing 140-2 in the second rear only has an output to export a string S (t) serial data; Should be the digital message of embedding of restoring, comprise " the English short sentence of open sesame 〞, the translator of Chinese of its 4 word and a pronunciation.
In embodiment 4
Fig. 6 covers the technology with conversion before describing and using more higher order wave, for encapsulating the management philosophy that mail data is sealed up at transmitting terminal (Tx).Cover with being utilize one group of M-to cover use to-M wavefront before a set of higher order wave; Wherein M be more than or equal to 4 integer.We lift 4 to 4 wavefront and cover the illustration being used as and sealing up/separate sealing operation concept.Seal up/three sections of groupings that solution is sealed up are with Xiang Tong ︰ (1) preliminary treatment 630 shown in Fig. 1 or seal up process, (2) transmit through high in the clouds 010, and (3) reprocessing 640 or solution seal up process.It illustrates above-mentioned first two sections.
A set of 4 to 4 wavefront in preliminary treatment 630 cover has four inputs and four outputs with device.Input is connected respectively to S (t), E10 (t), E1 (t) and E5 (t).Output only exports a string Ex (t) and its excess-three output head grounding.S (t) comprises " the English short sentence of open sesame 〞 and its four word translator of Chinese and pronunciations, and be the digital message by consigning to destination through high in the clouds.E5 (t) is by digital envelope selected in candidate's envelope Wen File 180.Cover with the first output Ex (t) of device substantially identical for human sensory with the profile of selected digital envelope E5 (t).Described be connected on second and the 3rd input two strings digital string E10 (t) and E1 (t) be also by digital archives selected in the digital envelope archives 180 of candidate.All known for the digital archives in transmit leg and recipient candidate envelope Wen File 180.
When we are the translation operation covered wavefront with a set of 4 to 4 extra large aunt's matrixes, cover and with the mathematical derivation of conversion be and those in fig. 2 identical.The computing that this cover 4 to 4 in preliminary treatment 630 covers at wavefront is write as based on formula (7);
E x ( t ) O 2 O 3 O 4 = + 1 + 1 + 1 + 1 + 1 - 1 + 1 - 1 + 1 + 1 - 1 - 1 + 1 - 1 - 1 + 1 a m * E 5 E 1 ( t ) E 10 ( t ) S ( t ) - - - ( 7 - 2 )
In Fig. 6 first exports O1 and is named as Ex (t), and other 3 outputs are ground connection.Amplification factor am is set to about 10, and its result makes the profile of Ex (t) being passed in the process of destination through high in the clouds 010, for human sensory, substantially with E5 (t) profile identical.
Fig. 7 is a width is the block diagram that solution seals up process in destination, is also the reversion process figure of Fig. 6.Describe that to use high-order front wave solutions to cover by technology be that a string digital string of being honored as a queen is sealed up to change through solution and reduced reception (Rx) management philosophy of the message number covered on wherein.A set of high-order front wave solutions is covered with being the computing utilizing one group of M-to cover to-M front wave solutions; Wherein M be more than or equal to 4 integer.Seal up/three sections of groupings that solution is sealed up are with Xiang Tong ︰ (1) preliminary treatment 630 shown in Fig. 1 or seal up process, (2) transmit through cloud 010, and (3) reprocessing 640 or solution seal up process.This illustrates above-mentioned latter two sections.
A string digital string of being honored as a queen be sent to through high in the clouds 010 can only be received in destination.Its excess-three string has been grounded at transmitting terminal.When suitably selecting digital envelope E5 (t) and doing corresponding optimization preliminary treatment 630 further, the communication channel bandwidth that this string is honored as a queen needed for digital string can be almost identical with the bandwidth of the signal of S (t) own.
In reprocessing 640 a set of 4 cover with there being four inputs to 4 front wave solutions; Access Ex (t) respectively, E10 (t), E1 (t), and E5 (t). wherein (1) Ex (t) is the digital string of being honored as a queen uniquely received, (2) E10 (t) is the known digital data of in candidate's envelope Wen File 180 one, (3) E1 (t) is the digital data that another part in candidate's envelope Wen File 180 is known, and (4) E5 (t) is the known digital envelope selected from candidate's envelope Wen File 180.For transmit leg and recipient, each number of packages code archives of candidate's envelope Wen File 180 are all known.According to formula (7-2);
Ex(t)=am*E5(t)+E1(t)+E10(t)+S(t)(8)
With S (t)=Ex (t) (am*E5 (t)+E1 (t)+E10 (t)) (8-1)
Archives Ex (t) of sealing up only having one to receive are used in formula (8-1).Cover the front wave solutions of a group 4 to 4 and use the second, three of computing, and the data of the 4th input are all given datas.Cover the digital message of the embedding being just with the S (t) solved computing from front wave solutions, " the English short sentence of open sesame 〞, the translator of Chinese of its 4 word and a pronunciation should be comprised.
In addition the O2 in formula (7-2), O3, and O4 can organize structure again based on recovered Ex (t).O2 after restructuring, O3, and O4 can compare with original number.Its object is to strengthen digital identification.
In embodiment 5
Fig. 8 and Fig. 9 depicts and covers for sealing up/solution the computing of sealing up with covering use/solution before higher order wave.During one group of 4 to 4 wavefront herein covers and export with four strings of conversion, two strings are had to be do the digital string of being honored as a queen as sealing up data set and to be sent to through high in the clouds 010 destination.
The technology that Fig. 8 covers before describing and using higher order wave, for transmission (Tx) management philosophy that mail data is sealed up.We cover with a set of 4 to 4 wavefront the illustration being used as operating concept.For three sections of groupings of sealing up/separating sealing operation concept are identical with those shown in Fig. 1; Include (1) preliminary treatment 630 or seal up process, (2) transmit through high in the clouds 010, and (3) reprocessing 640 or solution seal up process.This illustrates first two sections.
The running that a set of 4 to 4 wavefront cover in preliminary treatment 630 has four inputs to be connected respectively to S (t), E10 (t), E1 (t) and E5 (t), and only have two outputs to export a string Ex (t) and a string Ey (t) data.All the other two output head groundings.S (t) comprises " the English short sentence of open sesame 〞 and its 4 words Chinese translation and pronunciations, and be cover on to be delivered in the digital message to destination through high in the clouds.E5 (t) is selected digital envelope by described candidate's envelope Wen File 180, as first output export Ex (t) number string and described 3rd output export Ey (t) number string wherein a string, often string profile substantially all identical with the profile of E5 (t) for human sensory.Described second and the 3rd input access E10 (t) and E1 (t) number string be also by archives selected in the digital envelope archives 180 of described candidate.For transmit leg and recipient, the archives in candidate's envelope Wen File 180 are all known.
When with a set of 4 to 4 extra large aunt's matrixes being the conversion that wavefront covers use/solution and covers, mathematical derivation is herein and those in fig. 2 identical.A set of 4 to 4 wavefront in preliminary treatment 630 cover with can Xie Wei ︰ according to formula (7)
E x ( t ) O 2 E y ( t ) O 4 = + 1 + 1 + 1 + 1 + 1 - 1 + 1 - 1 + 1 + 1 - 1 - 1 + 1 - 1 - 1 + 1 a m * E 5 E 1 ( t ) E 10 ( t ) S ( t ) - - - ( 7 - 3 )
First and the number string that exports of Article 3 output, O1 and O3, is named as the number string of Ex (t) and Ey (t) respectively.Other 2 outputs in Fig. 8 are grounded.Due to zoom factor am be set to ~ 10, so, be no matter that the outward appearance of Ex (t) and Ey (t) is identical being passed in the process of destination with the outward appearance of E5 (t) human sensory through high in the clouds 010 respectively substantially.
Fig. 9 seals up block diagram in the solution of destination; Also be the reversion process figure of Fig. 8.It is described that to use high-order front wave solutions to cover to do solution by technology to serial data of being honored as a queen and seal up or message data receiver (Rx) management philosophy of the computing that claims to break a seal.
Wavefront covers in after using four string digital data and only has two strings to be sent to destination through high in the clouds 010, and the total bandwidth of required communication channel can be about the twice of S (t) signal itself.When suitably being selected digital envelope E5 through 630 optimizing further and two strings that convert to are honored as a queen digital string in preliminary treatment, be often the honored as a queen bandwidth of communication channel needed for digital archives of string can be correspondingly the equally wide communication bandwidth of the bandwidth of S (t) own.
In reprocessing, use a set of 4 to cover 4 front wave solutions used computing.Containing four inputs; Access (1) Ex (t) respectively; The digital string of the first string received, (2) Ey (t); The digital string of the second string received, (3) E10 (t); The a string datum code data selected from candidate's envelope Wen File 180, and (4) E5 (t); One number of packages code envelope of a string datum code data selected from candidate's envelope Wen File 180.According to formula (7-3);
Ex(t)=am*E5(t)+E1(t)+E10(t)+S(t)(7-4)
Ey(t)=am*E5(t)+E1(t)-E10(t)-S(t)(7-5)
With S (t)=[Ex (t)-Ey (t)]/2-E10 (t) (9)
In formula (9), make use of two strings received to be honored as a queen digital string, Ex (t) and Ey (t).The Article 3 that this 4 to 4 front wave solutions is covered is input as E10 (t); A string known data.Article 4 is input as E5 (t); Also be known data set.In formula (9), do not need E5 (t) just can calculate S (t).But, cover the digital archives after with conversion from four wavefront and select two pieces and have six kinds of different combinations as two strings archives number string of being honored as a queen.Known three groups of data E10, E1 and E5 all can be utilized to do the restructuring computing recovering S (t) in these six kinds combinations, but manyly be combined in the given data recovering to need more than a group in the restructuring computing of S (t).
Covering from front wave solutions the S (t) obtained with computing should be exactly the digital message covered in digital envelope, and comprises " the English short sentence of open sesame 〞, the translator of Chinese of its 4 word and a pronunciation.
In addition according to formula (7-2), again can calculate again from the S (t) calculated by computing at destination O2 and O4.Its result compares with original data again.O2 and O4 after reruning may be used for the Data Identification strengthened.
Embodiment 6
Figure 10 illustrates and adopts the wavefront of more high-order to cover use technology, seals up the management philosophy of transmission (Tx) for mail data.We cover with a set of 4 to 4 wavefront and are used as operating concept.There are three to export in four outputs that these cover 4 to 4 wavefront cover and are sent to destination as digital string of being honored as a queen through high in the clouds 010.
These 4 to 4 wavefront be enclosed within preliminary treatment 630 cover with being have four inputs to access S (t) respectively, E10 (t), E1 (t) and E5 (t).Its four outputs only have three to export Ex (t) respectively, Ey (t) and Ez (t).A remaining output is grounded.Selecting three in exporting at four has 4 kinds of possible configurations to select.S (t) is that will to consign to the message of destination through high in the clouds digital and comprise " the English short sentence of open sesame 〞, the translator of Chinese of its 4 word and a pronunciation.E5 (t) is from the digital envelope selected by described candidate's envelope Wen File 180.In addition for human sensory, export Ex (t) described first, second exports Ey (t), and the 3rd exports in Ez (t), and external appearance characteristic of often going here and there is identical with those external appearance characteristics of E5 (t) substantially.Described second and the 3rd input access E10 (t) and E1 (t) be also from the archives selected by described candidate's envelope Wen File 180.What for sender and recipient, these were selected is all known digital archives.This figure to cover as wavefront with a set of 4 to 4 extra large aunt's matrixes.According to formula (7), a set of 4 to 4 wavefront in preliminary treatment 630 cover with computing Wei ︰
E x ( t ) E y ( t ) E z ( t ) O 4 = + 1 + 1 + 1 + 1 + 1 - 1 + 1 - 1 + 1 + 1 - 1 - 1 + 1 - 1 - 1 + 1 a m * E 5 E 1 ( t ) E 10 ( t ) S ( t ) - - - ( 7 - 6 )
Its first, the second, and the 3rd output, O1, O2, and O3, by difference called after Ex (t), Ey (t), and Ez (t).The 4th output is in Fig. 10 grounded.Ex (t), Ey (t), and Ez (t) will be passed to destination through high in the clouds 010 respectively.Zoom factor am is set to ~ and the result of 10 is the arbitrary string external appearance characteristics three strings being exported be honored as a queen in digital string, no matter be Ex (t), Ey (t), or Ez (t), substantially identical with the outward appearance of E5 (t) for the organ of human body in transmittance process.
By when suitably selecting digital envelope E5 after preliminary treatment 630 is optimized further, three strings are honored as a queen digital archives, and channel width needed for every part is equally large with the channel width of S (t) own respectively.So the communication channel bandwidth needed for transmittance process is about correspondingly 3 times of the bandwidth of S (t) signal own.Extra bandwidth difference is due to processing expenditure.
Figure 11 is that a width seals up running block diagram in the solution of destination; Also be the reversion process figure of Figure 10.It is described that solution seals up the management philosophy that running receives (Rx) message number.Only need receive in time in destination and cover two strings of being honored as a queen in number after with running through high in the clouds 010 3 string wavefront.This figure supposes the digital string of being honored as a queen that two strings that Ex (t) and Ey (t) receives in destination exactly arrive first.
In reprocessing 640 a set of 4 cover with running 4 front wave solutions.Four inputs are had to access four strings respectively digital; (1) Ex (t); First is connected in series the digital string of being honored as a queen received, (2) Ey (t); Second is connected in series the digital string of being honored as a queen received, (3) E10 (t) be one at candidate's envelope literary composition File 180 known digital archives, (4) E5 (t) is another part at the known digital archives of candidate's envelope literary composition File 180, is also a digital envelope selected.According to formula (7-6);
Ex(t)=am*E5(t)+E1(t)+E10(t)+S(t)(7-8)
Ey(t)=am*E5(t)-E1(t)+E10(t)-S(t)(7-9)
Ez(t)=am*E5(t)+E1(t)-E10(t)-S(t)(7-10)
With S (t)=[Ex (t)-Ey (t)]/2+E1 (t) (10)
Be honored as a queen digital archives Ex (t) and Ey (t) that formula (10) receives containing two pieces.These cover 4 to 4 front wave solutions cover that to input E1 (t) with the 3rd of computing be known digital archives.Its 4th input E5 (t) is also known data set equally.But asking in the computing of S (t) at formula (10) is do not need E5's (t).
Covering with the S (t) obtained computing from front wave solutions should be that in transmittance process, cover on message in digital envelope digital, and comprises " the English short sentence of open sesame 〞, the translator of Chinese of its 4 word and a pronunciation.
In addition according to formula (7-2), O3 and O4 can newly obtain S (t) in object utilization and again calculate.O3 with O4 after restructuring can for the identification strengthening digital data compared with former digital data.
Figure 12 is that another width seals up running block diagram in the solution of destination; Also be the reversion process figure of Figure 10.It is described that solution seals up the management philosophy that running receives (Rx) message number.Only need receive in time in destination and cover two strings of being honored as a queen in number after with running through high in the clouds 010 3 string wavefront.This figure supposes the digital string of being honored as a queen that two strings that Ez (t) and Ey (t) receives in destination exactly arrive first.
In reprocessing 640 a set of 4 to cover 4 front wave solutions and have four inputs with computing; Access the digital archives of four strings respectively; (1) Ex (t) is first digital archives of being honored as a queen received, (2) Ey (t) second digital archives of being honored as a queen received being, (3) E10 (t) selects from known candidate's envelope Wen File 180, (4) E5 (t) is also the known numerical data of of selecting from candidate's envelope Wen File 180, is also selected digital envelope.According to formula (7-6);
Ey(t)=am*E5(t)-E1(t)+E10(t)-S(t)(7-11)
Ez(t)=am*E5(t)+E1(t)-E10(t)-S(t)(7-12)
With S (t)=am*E5 (t)-[Ey (t)+Ez (t)]/2 (11)
Be honored as a queen archives Ey (t) and Ez (t) that two pieces receives is employed in formula (11).These cover 4 to 4 front wave solutions are covered and are input as E1's (t) by the Article 3 of computing; It is a known digital data.Its 4th defeated article enters E5's (t); Also be known digital data.But utilize formula (11) to ask during the recovery computing of S (t) and do not need E1's (t).Covering with the S (t) newly obtained computing from front wave solutions should be in transmitting procedure, cover on the digital message of paying in digital envelope, should comprise " the English short sentence of open sesame 〞 and its four word translators of Chinese this and pronunciation.In addition O1 and O4, also newly can rerun out with newly obtaining S (t) according to formula (7-6), then compare the identification for strengthening digital data with the former digital data of O1 and O4.
Figure 13 is that another width seals up running block diagram in the solution of destination; Also be the reversion process diagram of Figure 10.Which depict the data that solution seals up running message, through high in the clouds 010, three wavefront are being covered digital archives Ex (t) of being honored as a queen after with process, Ey (t), and Ez (t) delivers to reception (Rx) management philosophy of object timely.
In reprocessing 640 a set of 4 to cover 4 front wave solutions and have four inputs with computing; Access four number of packages code archives respectively; (1) Ex (t) is first digital archives of being honored as a queen received, (2) Ey's (t) is second digital archives of being honored as a queen received, (3) E1 (t) is the archives selected from known candidate's envelope Wen File 180, and the digital archives of being honored as a queen that (4) Ez (t) the 3rd receives.
According to formula (7-6);
Ex(t)=am*E5(t)+E1(t)+E10(t)+S(t)(7-13)
Ey(t)=am*E5(t)-E1(t)+E10(t)-S(t)(7-14)
Ez(t)=am*E5(t)+E1(t)-E10(t)-S(t)(7-15)
With S (t)=am*E5 (t)-[Ey (t)+Ez (t)]/2 (12-1)
Or S (t)=[Ex (t)-Ey (t)]/2-E1 (t) (12-2)
Or S (t)=[Ex (t)-Ez (t)]/2-E10 (t) (12-3)
To the digital archives of being honored as a queen that three receive, Ex (t), Ey (t) and Ez (t), do in the computing that digital mail S (t) recovers the two pieces that can use wherein utilizing formula (12).Formula (12-1), (12-2) and (12-3) describes the recovery computing that three kinds of options do digital mail S (t) respectively.They all need the 3rd the delimited digital archives being input to these cover 4 to 4 front wave solutions and covering.The 3rd archives required by the Recovery processing of formula (12-1) are original digital envelopes E5 (t).Similarly, according to formula (12-2) and (12-3) and described third gear case be the digital archives of E1 (t) and E10 (t) respectively.
Formula (12) is utilized to have three groups of receivers that may recover the flexibility group of restructuring S (t) computing that any two pieces that may arrive first in reception three number of packages code can be utilized to carry out computing, Ex (t), Ey (t) and Ez (t).Also before being sent to destination in the digital archives after can only utilizing these three wavefront to cover use, two pieces numerals sum abandons last part (the 3rd) sent from source.This kind of high in the clouds transmission technology provides the service of timely music or video clip, should enhanced data stream speed and better data flow survivability beyond the clouds and reliability are provided.
In other application, above-mentioned multiple reparation operation method, can be used for the preference distinguishing multicasting mode or broadcast mode service.Those are not accessed to the client of E1 and E10 in above-mentioned different example; If only only send Ey and Ez to them through high in the clouds 010 simultaneously, this service is completely invalid and be denied.Same, send Ex (t) to do video streaming services but the digital flow velocity of control Ex (t), with slower speed transmission for this crowd of clients if add again through high in the clouds 010.For example by front two string bitstreams with three points one probability be in natural rate of interest and deliver to destination through high in the clouds 010.Its result is recovered in the process of video in client.Being significantly reduced or being delayed by two flows of three points of the corresponding total flow received when the transmission flow rate of Ex (t) is in 33% of normal flow rate.
Figure 14 is that another width seals up running block diagram in the solution of destination; Also be the reversion process figure of Figure 10.This sets of plan is that Selection utilization 3 wavefront cover with rear digital data Ex (t), and Ey (t), with Ew (t), is sent to destination through high in the clouds 010.Which depict one group through three digital data covered after use running in high in the clouds 010, seal up the management philosophy of digital message reception (Rx) of running in destination through solution.Destination receive in time three wavefront cover with after digital data be Ex (t), Ey (t) and Ew (t).
In reprocessing 640 a set of 4 to cover 4 front wave solutions and have four inputs to access four string digital data respectively with computing; (1) Ex (t) is the first string digital data received in time, (2) Ey (t) is the second string digital data received in time, (3) E1 (t) is the known digital archives selected from candidate's envelope literary composition File 180, and (4) Ew (t) is the 3rd string digital data received in time.
According to formula (7-6);
Ex(t)=am*E5(t)+E1(t)+E10(t)+S(t)(7-16)
Ey(t)=am*E5(t)-E1(t)+E10(t)-S(t)(7-17)
Ew(t)=am*E5(t)-E1(t)-E10(t)+S(t)(7-18)
With S (t)=E10 (t)+Ey (t)-Ew (t)]/2 (12-4)
Or S (t)=[Ex (t)-Ey (t)]/2-E1 (t) (12-5)
Or S (t)=[Ex (t)+Ew (t)]/2amE5 (t) (12-6)
In every bar formula of formula (12), all use three serial connections receive digital archives of being honored as a queen, Ex (t), Ey (t), and two strings in Ew (t).Here have three options to utilize formula (12-4) respectively, (12-5), and (12-6) do the restoration disposal computing of delimited digital mail S (t).Be similar to the block diagram of Figure 13, they all need one to receive these cover 4 to 4 front wave solutions to cover digital archives with running the 3rd input.According to the restoration disposal of formula (12-4), the archives of required access the 3rd input are original digital archives E10 (t).Similarly, according to the archives of formula (12-5) and (12-6) restoration disposal and described access the 3rd input be the digital archives of E1 (t) and that E5 (t) respectively.
Formula (12) is utilized to have three groups of receivers that may recover the flexibility group of restructuring S (t) computing that any two pieces that may arrive first in reception three number of packages code can be utilized to carry out computing, Ex (t), Ey (t) and Ew (t).Also before being sent to destination in the digital archives after can only utilizing these three wavefront to cover use, two pieces numerals sum abandons last part (the 3rd) sent from source.This kind of high in the clouds transmission technology provides the service of timely music or video clip, should enhanced data stream speed and better data flow survivability beyond the clouds and reliability are provided.
Embodiment 7
Figure 15 describes to overlap wavefront through use two and covers and do pair management philosophy sealing up transmission with the order logarithmic code message mail of sealing up of setting.It illustrates first two sections in three sections of process of Fig. 1.Three sections of process of Fig. 1 comprise ︰ (1) preliminary treatment 130 or seal up process, and (2) transmit through high in the clouds 010, and (3) reprocessing 140 or solution seal up process.
Process sealed up by two two covers processed containing in series connection of sealing up that Figure 15 describes.Internal layer number seal up to operate with sealing up in Fig. 6 respectively with the running of sealing up of skin number and sealing up in Fig. 1 to operate be identical.Four inputs in the preliminary treatment 630 of first set access 4 string digital data archives respectively, S (t), E10 (t), E1 (t) and E4 (t).Unique output of its 4 outputs is distributed as the digital archives of an output w (t).Other 3 outputs, x (t), y (t), and z (t), be grounded.S (t) is through the digital message that high in the clouds is delivered to destination, should comprise " an English short sentence of open sesame 〞, and translator of Chinese and pronunciation.E4 (t) is a digital envelope of internal layer selected from candidate's envelope Wen File 180.For human body, first external form feature exporting w (t) is substantially identical with the external form of E4 (t).
The preliminary treatment 130 of the second cover has two inputs to access w (t) and E5 (t) number string respectively, and its first output is designated as output Es (t) number string.Its second output is grounded.E5 (t) number string is from the digital envelope of the skin selected by candidate's envelope Wen File 180.For human body, first external form feature exporting Es (t) is substantially identical with the external form of E5 (t).
Only have a wavefront to cover digital archives Es (t) after with running and can be sent to destination through high in the clouds 010.The outward appearance of Es (t) does not have " the English short sentence of open sesame 〞 or its translator of Chinese.When E4 (t) or E5 (t) be suitably select time.For carry in time the required band bandwidth of Es (t) with send the required bandwidth of S (t) through high in the clouds should be closely identical.
In other embodiments, sealing up the image of archives in order to various object possibilities first pretreated mistake, such as, in order to reduce the dynamic range of single pixel, or the front enhancing status covered for wavefront is simply verified and qualification.The digital archives of many pretreated mistakes can be stored in advance in the digital envelope archives of candidate as the digital archives of optional candidate by.Certainly, these extra preliminary treatment also can be taken as a part for the preliminary treatment 130 of first set preliminary treatment 630 and/or the second cover.
Figure 16 describes and uses front wave solutions to cover to go to seal up digital message and do to two reception (Rx) management philosophy that solution seals up by method.Two cover solutions of series connection are sealed up in process running, and outer digital envelope is opened in the first reprocessing 140, and it is identical that solution as shown in Figure 1 seals up process running.It has two inputs to access the digital archives of Es (t) and E5 (t) respectively.Es (t) is the digital archives of being honored as a queen received desired by the receiver of destination, containing the digital message mail covered on wherein.The digital archives of unique output of described second cover preliminary treatment 130 in fig .15 of should making peace greatly are identical.In addition should be substantially identical with the external physical characteristic of those E5 (t) for human sensory Es (t) external physical characteristic.E5 (t) is a digital envelope of the skin selected from candidate's envelope Wen File 180.All known for the digital archives in transmit leg and recipient candidate envelope Wen File 180.
Equally, reprocessing 140 also has two outputs.From a string digital archives w (t) that reprocessing 140 first output exports, its outward appearance is substantially identical with the outward appearance of E4 (t) for human body.Its second output is grounded.
The reprocessing 640 of the second cover has four inputs, is connected respectively to digital archives w (t) of four strings, E10 (t), E1 (t) and E4 (t).E4 (t) is that the digital envelope that selected internal layer is sealed up also is selected from candidate's envelope Wen File 180.E10 (t) and E1 (t) is also the digital archives of two pieces selected from candidate's envelope Wen File 180.The output of the reprocessing 640 of the second cover, be appointed as except Article 1 and export except S (t), remaining is all grounded.First S (t) exported is exactly the digital message of restoring.
Can expect covering with through the M-to-M wavefront being enclosed within source more and overlapping more covering use in the M-to-M front wave solutions of reprocessing, prolong raw as shown in Figure 15 and Figure 16 two seal up/solution seals up running to multilayer and seals up/solution seals up running, wherein M is one and is more than or equal to 2 integers.
Embodiment 8
Number is sealed up and solution seals up the instrument that may be used for digital rights management (DRM).We can illustrate with Fig. 1 a set of DRM framework being applied in a distribution New cinema.At mother matrix originally by the movie in its original version of distribution.We snugly embed the digital archives of various different unique differences by using the digital encapsulation technique that adds in different child release films (copy).Shown in the figure add encapsulation technique and can utilize as Fig. 1, Fig. 4, or the number shown in Fig. 6 seals up process.Copying of each sub-version New cinema originally will have identical outward appearance and almost identical vision and sense of hearing film function substantially with mother matrix film.
When pirated film is originally found, the bad pipe leakage no matter being through distribution produces, or at the new film that commercial electrical movie theatre records through the video tape recorder hidden, we can utilize piracy and mother matrix film simultaneously through such as Fig. 1, Fig. 5, or the solution of Fig. 7 is sealed up processor and is carried out restoration and reconstruction one and hide and be embedded in the uniqueness of pirated film in this and distinguish digital archives.It is the child releases coming from what version that identifiable design is gone out this pirate version by the difference archives of these uniquenesses.
Em (t) in FIG for preliminary treatment 130 input represents original mother matrix film, and Idx (t) represents hidden close certain unique identification archives being embedded in certain sub-version film.First of the preprocessor 130 that one group of 4 to 4 wavefront covers exports and is configured to sub-version film copy Echx (t), and its Audio and Video exports will be had and mother matrix film Em (t) almost identical vision and sense of hearing film function substantially.This wavefront covers and is grounded with two remaining inputs of device and three outputs.
Former mother matrix this Em of film (t) can not public publication.They can be stored in storehouse or cloud store in.Sub-version film is by the distributing tube public publication through distribution.Each sub-version film all has and this identical picture of mother matrix film and audio quality substantially.But each sub-version film is originally all sealed up process through number and is thickly embedded unique discernible unique identification archives by hidden.Mother matrix film function is turned into unique digital envelope.Hidden close embedding mark message or unique identification archives are all sub-version film parts originally.Hidden close embedding mark message is not the technology utilizing tangible watermark and sightless invisible watermark.
Usually, a book version film, uses rear archives, M (2 herein comprising covering covering of generating with process via one group of M-to-M wavefront.One group of M-to-M wavefront covers purpose processor the equation that M bar is relative.Selected sub-version film originally can only be one in corresponding M bar equation.If the personnel be associated with certain book version film want to the film of selected child release make more copy with distribute again issue and want to change embed identify archives time, he or she must have this wavefront to cover other M-1 bar of purpose processor to input digital archives.These M-1 input can be used as extra detection, more privacy and enhancing certification, or other objects.That process is sealed up for the number of M=2 shown in Fig. 1.
When the pirate copies of a certain sub-version film is captured or intercepted and captured on network for distributed sales in market, the source of its sub-version film can be covered with processing the identification marking of restoration and reconstruction or unique identification archives through front wave solutions as shown in Figure 1 and find.The front wave solutions of Fig. 1 multichannel input is covered purpose processor and is comprised at least two input archives; Article 1, be discovered and seized pirated film Echx (t), Article 2 is original master film Em (t).
We use motion picture film to do number to seal up in DRM application/and digital solution adds the example of encapsulation technique.Identical number seals up/and engineering philosophy that digital solution is sealed up also can be used in sound or other audio digital, through in the application that cloud or other public ip networks provide.
In addition, we also can use Figure 17 A application at another DRM framework 1710 of a distribution New cinema.Mother matrix film 1800 or mother matrix basis by the movie in its original version of distribution.We snugly embed the digital archives of various different unique differences by using the digital encapsulation technique that adds in different sub-version films 2000 or child release film (copy).Shown in the figure add encapsulation technique and can utilize as Fig. 1, Fig. 4, or the number shown in Fig. 6 seals up process.Copying of each sub-version New cinema originally will have identical outward appearance and almost identical film function substantially with mother matrix film.The preliminary treatment 630 that we have selected in Fig. 6 seals up processor as number here.
When pirated film is originally found, the distributing tube leakage no matter being through damage produces, or at commercial electrical movie theatre through the New cinema sheet that records of video tape recorder hidden, we can utilize piracy and mother matrix film to seal up processor through the solution of such as Figure 17 B to carry out restoration and reconstruction one and hide and be embedded in the uniqueness of pirated film in this and distinguish digital archives simultaneously.Seal up in process framework 1790 in this solution, it is the child releases coming from what version that identifiable design is gone out this pirate version by the difference archives of these uniquenesses.
In Figure 17 A, represent original mother matrix film for the Em (t) of preliminary treatment 630 input, Idx (t) represents hidden close certain unique identification archives being embedded in certain sub-version film.One group of 4 to 4 wavefront in preliminary treatment 630 covers and is configured to sub-version film copy Echx (t) with the first output, and its Audio and Video exports will be had and mother matrix film Em (t) almost identical film function substantially.This wavefront covers and is grounded with two remaining inputs of device and three outputs.
Former mother matrix this Em of film (t) can not public publication.They can be stored in storehouse or cloud store in.Sub-version film is by the distributing tube public publication through distribution.Each sub-version film all has and this identical picture of mother matrix film and audio quality substantially.But each sub-version film is originally all sealed up process through number and is thickly embedded unique discernible unique identification archives by hidden.Mother matrix film function is turned into unique digital envelope.Hidden close embedding mark message or unique identification archives are all sub-version film parts originally.Hidden close embedding mark message is not the technology utilizing tangible watermark and sightless invisible watermark.
Usually, a book version film, uses rear archives comprising covering covering of generating with process via one group of M-to-M wavefront.One group of M-to-M wavefront covers purpose processor the equation that M bar is relative.Selected sub-version film originally can only be one in corresponding M bar equation.If the personnel be associated with certain book version film want to the film of selected child release make more copy with distribute again issue and want to change embed identify archives time, he or she must have this wavefront to cover other M-1 bar of purpose processor to input digital archives.These M-1 input can be used as extra detection, more privacy and enhancing certification, or other objects.Being seal up process for the number of M=2 shown in Fig. 1, is seal up process for another kind number during M=4 shown in Figure 17 A.
When the pirate copies of a certain sub-version film is captured or intercepted and captured on network for distributed sales in market, the source of its sub-version film can be covered with processing the identification marking of restoration and reconstruction or unique identification archives through front wave solutions as shown in Figure 1 and find.The front wave solutions that in Figure 17 B reprocessing 640, multichannel inputs is covered purpose processor and is comprised at least two input archives; Article 1, be discovered and seized pirated film Echx (t), Article 2 is original master film Em (t).
For Multi-layers distributing, similar concept can originally expand to grandson's version film originally from sub-version film.Every one deck of motion picture distribution business all can have the instrument of oneself to follow the tracks of leakage hole at respective network for distributed sales.
In other embodiments, preliminary treatment 630 or number seal up other two inputs of processor can be earth-free and for the additional function of more certifications or other privacies.
We use motion picture film to do number to seal up in DRM application/and digital solution adds the example of encapsulation technique.Identical number seals up/and engineering philosophy that digital solution is sealed up also can be used in sound or other audio digital, through in the application that cloud or other public ip networks provide.
Embodiment 9
Number is sealed up and solution is sealed up and in again broadcasting, thickly can be provided appended message to user is hidden.We can again illustrate to utilize with Figure 17 A and again be broadcast to the hidden framework thickly providing appended message of user.Initial broadcast Em (t), as an example, is one section of mother matrix home news of 30 minutes.Use number adds by we, and encapsulation technique is hidden in sub-version this Echx of news broadcast (t) thickly embeds second segment special report Idx (t).Under book version news broadcast Echx (t) during the result that one group of number in preliminary treatment 630 seals up process as shown in Figure 17 AB makes it export occurs with the outward appearance of mother matrix news broadcast Em (t) of original, height copies and substantially will have identical outward appearance and identical video and audio-frequency function.
At receiver user, only have repeated broadcast message Echx (t) and original master broadcast archives Em (t) as seen in this fig. 17b while seal up processor through solution corresponding in reprocessing 640 and hidden for second segment close special report Idx (t) restructuring could be recovered.User also can watch hidden close special report Idx (t) except watching repeated broadcast message Echx (t).
Represent the mother matrix of former news broadcast originally at Figure 17 A Em (t) be used in preliminary treatment 630, Idx (t) is a bit of special news report.The configuration of the preliminary treatment 630 that one group of 4 to 4 wavefront covers makes its multiple-channel output significantly emphasize the characteristic of Echx (t).Its first output is the child release of a news broadcast.And the Audio and Video outward appearance of this child release is substantially almost identical for human sensory with the outward appearance of mother matrix news broadcast Em (t).Two inputs that preliminary treatment 630 is remaining and three outputs all ground connection.
The news broadcast of original master Em (t) and child release Echx (t) disappear by through various pipeline in the different time periods, or both combination distributions or broadcast away.This book version news broadcast Echx (t) substantially should be almost identical with the outfit in sound quality at image with mother matrix news broadcast Em (t).
In this external different embodiment, every book version copies and can embed difference but the additional news report of uniqueness.Mother matrix news broadcast is as the function of unique shared digital envelope.The hidden close unique message of difference embedded is a part for each news broadcast child release.
For repeatedly repeated broadcast, similar concept can expand to grandson's version of news broadcast again.
In other embodiments, preliminary treatment 630 can be utilized or seal up other two grounding ports of processor; No longer ground connection but access are used for the digital signal string of the additional function of certification or other privacies.
We sealing up/solution adds the pattern of encapsulation technique news broadcast to transmit the example of additional news.Same principle is also applicable to the transmission of the digital message of other hidden close unique IP provided through cloud or other distributed networks.
Embodiment 10
Number is sealed up and solution is sealed up to utilize and is broadcasted repetitively to the instrument that user provides the additional hidden close Information service of transmission.Figure 18 A shows one group and utilizes broadcast and frameworks of other unique additional new messages of hidden close broadcast between broadcast again.As an example, originally will be modified before broadcasting the mother matrix of one section of domestic original news Em (t) of 30 minutes.We use number to add encapsulation technique to version when copy Idx (t) of dissemination of news and Isx (t), second segment independently special report Ec (t) is all embedded in two child releases, wherein Isx (t)=MEm (t)+Ec (t) and Idx (t))=MEm (t)-Ec (t) and M is amplification coefficient, and should 1 be more than or equal to.As sealed up the result of process at one group of number in preliminary treatment 630 shown in Figure 18, the outward appearance of dissemination of news two book version copy, Isx (t) and Idx (t), the Audio and Video outward appearance broadcasting Em (t) to human sensory and original master is substantially almost identical.Described first time broadcasts one that will provide in two child releases, such as Isx (t), and (for the second time) broadcast will provide other remaining child release Idx (t) again.
In receiver user, only has the first book version digital archives play when this first time, Isx (t), with the second book version digital archives that described second time is play, Idx (t), seal up on processor as described in Figure 18 b through solution corresponding in reprocessing 640, hidden especially close message report just can reorganizedly recover simultaneously.So the first book version archives Isx (t) must correctly be recorded via suitable buffer-stored in the reception.User, except having again the service of broadcast Idx (t), also has and seals up through number and watch the option service that hidden especially close message Ec (t) is broadcasted.
Many cable television services and satellite television provider all simultaneously or almost simultaneously provide identical program through multiple channel.On the other hand, many broadcast platforms repeatedly provide same program via same channel.These redundant messages send or speech amplifier can be able to be used to add through number the appended message or digital file that encapsulation technique provides.
The broadcast technology that number is sealed up more can be expanded to two-way communication.In addition, they also can pass through multistage broadcast, provide the chance of transmission one group of new data.The mechanism that this number is sealed up, in the hidden close message recovering to embed or data flow, can be configured to have redundancy feature.For example, hidden close message or data flow can play back from any three groups four groups of playback programs with regard to the reorganized recovery of energy.
Can expect, the setting through multistage repeated broadcast program provides the hidden close transfer approach of a new data.
As for domestic consumer, they may see the program of identical repeated broadcast repeatedly.But have number for other to seal up and solution is sealed up for special user's group of ability, these existing service providers being used in the excess channel capacity of repeated broadcast, can provide new data, archives, and the extra channel capacity of message transmission.Encapsulation technique is added and the additional channel capacity that produces more may be used for transmitting more pay TV programs, the real-time message of stock exchange, the broadcast of traffic by number; Etc..
Embodiment 11
Nearest protection is stored in private message in cloud and data-privacy becomes important topic.Number is sealed up and solution adds encapsulation technique and can strengthen the data that cloud stores and comprise the secret protection of personal digital photo.They become user and realize better protecting privacy instrument to the data be stored in cloud.We use the smart mobile phone of personal device as an example, brightly how store and transmit private concealed picture through high in the clouds.Similar concept can be applied on other personal device; For example flat computer, iPads, WindowSurfaces, GalaxyNotes, etc.
Figure 19 shows smart mobile phone 1900 how 010 simple block diagram storing the photo of shooting beyond the clouds; Main process includes three pieces of modules, shooting optical imagery (photo), and the local photo storing shooting, stores the backup (copy) of taking pictures in elsewhere through cloud section.A smart mobile phone camera 1901 allows user be used for taking many photos.These photos can be stored in the local loose-leaf binder 1902 as digital photo album, at least the user of smart mobile phone 1900 also selectively can also be registered to the service through the backup image provided by cloud operator, waits for the synchronous service of the distributed store backup photograph album provided by cloud operator with the local loose-leaf binder 1911 of automatic synchronization in this locality.Synchronizing process is through smart mobile phone cloud interface 1921 or through being wiredly connected to internet 001, or is connected to high in the clouds 010 or internet through in cellular telephone band or ISM band radio.These backup photos in cloud freight house have the one group of cryptoguard or a string picture number that are associated.Consequently, the backup of photographic images is stored in high in the clouds 010 the most at last.Cloud store backup photograph album in photo or have the account number cipher of confucian orthodoxy to protect at multiple cloud storage to major general.
The calcspar of Figure 19 A shows and how these pictures that smart mobile phone camera 1701 photographs is done the process that number seals up, and then add the photo of being honored as a queen in local digital storage space 1702 like the storage as digital photo album, add the photo of being honored as a queen or/and be stored in the pattern storage of digital photo album in high in the clouds 010.This smart mobile phone 1700 and the smart mobile phone 1900 in Figure 19 are all according to there being identical major function.Smart mobile phone camera 1701 is used to as user takes digital photograph.The figure sector-meeting that these photograph is stored in like code photo album in local loose-leaf binder 1702 in full.Deposited image and had at least the protection having relevant account number cipher to smart mobile phone.In addition, these images S (t) also can pass through more process additionally, such as utilize known image or digital archives, with E5 (t) for select one group digital envelope, before image storage, do the process that number seals up by preliminary treatment 130.This organizes digital envelope, as discussed earlier, be from local candidate's envelope literary composition file 180 can image select.Cover with 130 by two groups of input pictures of transmission to the wavefront of 2 for one group 2, two groups of output images that E5 (t) and S (t) converts to; Es (t) and Ed (t).E5 (t) covers at wavefront and is weighted appropriately with in conversion, so that the vision for human body of output image Es (t) and the sense of hearing are identical with E5 (t) substantially.
One group in two groups of outputs will be only stored, Es (t) or Ed (t) during cloud stores.To the photo that cloud stores, smart phone user can have multiple choices; Selection is like this directly through the backup photo service provided by cloud storage operator, and this service is the accreditation processes needing to store through cloud operator.These backup photos can use the form of secret protection; As number seals up the form of rear photo.Another kind of possible selection, can add number photo Es (t) of being honored as a queen by user and be dragged in an autosynchronous local loose-leaf binder 1711 and re-send to high in the clouds 010.Automatic synchronization is through smart mobile phone cloud interface 1721 and utilizes mobile portable phone frequency band or ISM band radio to connect, or through the internet be wiredly connected in high in the clouds 010.Consequently, image S (t) the most at last number add the form of photo Es (t) of being honored as a queen and be stored in high in the clouds 010.To seal up in the process of 140 as shown in Figure 19 B recovering the solution of photo, if do not have original digital envelope E5 (t) in the candidate's envelope literary composition File 180 stored local, it is the original photo S's (t) that cannot be converted to reconstruction that the number be stored in high in the clouds 010 adds photo Es (t) of being honored as a queen.Therefore, digital photograph is stored in the privacy that form that number adds photo of being honored as a queen enhances storage picture.
Number seal up can use dual or triple envelope add encapsulation technique, or cover use through the wavefront of high-order; Or both combination even as previously discussed.Original photo can be divided into multiple less archives size by the scheme that high-order number is sealed up; Every then wavefront covers the number string after with conversion can by identical digital envelope; Or seal up process through different digital envelopes respectively.
Block diagram shown in Figure 19 B, user can through the smart mobile phone of oneself or through the solution of its PC in reprocessing 140 seal up process fetch the photo being stored in high in the clouds 010.What be stored in high in the clouds adds picture Es (t) of being honored as a queen, and only when in the digital form E5 (t) with original envelope simultaneously preprocessor 140 all in the receiver, just can reconstruct and recover original digital photograph S (t).The photo of being honored as a queen that adds deposited in the form of Es (t) processes via reprocessing 140 with its original digital envelope E5 (t) simultaneously, carries out one group 2 and covers with transforming 2 front wave solutions.In reprocessing 140, front wave solutions covers one group in exporting with conversion two groups will be original image S (t) of restoration and reconstruction.Picture after restoration and reconstruction will be presented at portable display or PC screen.
Embodiment 12
This scheme to seal up through number the private photos being stored in high in the clouds and technology that solution is sealed up presents another example of secret protection.The control of privacy is in user Bu Shi cloud operator.We use the smart mobile phone of personal device to store through high in the clouds for example and transmit private concealed photo.Similar concept can be applied on other personal device; For example flat computer, iPads, WindowSurfaces, GalaxyNotes, etc.
The calcspar of Figure 20 A shows and how these pictures that smart mobile phone video camera 1701 photographs is done the process that number seals up, and then add the photo of being honored as a queen in local digital storage space 1702 like the storage as digital photo album, add the photo of being honored as a queen or/and be stored in the pattern storage of digital photo album in high in the clouds 010.This smart mobile phone 1700 and the smart mobile phone 1900 in Figure 19 are all according to there being identical major function.The video camera 1701 of smart mobile phone is used to as user takes digital photograph.The figure sector-meeting that these photograph is stored in like code photo album in local folder 1702 in full.Deposited image and had at least the protection having relevant account number cipher to smart mobile phone.In addition, these images S (t) also can pass through more process additionally, such as utilize known image or digital archives, with E5 (t) for select one group digital envelope, before image storage, do the process that number seals up by preliminary treatment 130.This organizes digital envelope, as discussed earlier, be from local candidate's envelope literary composition file 180 can image select.In preliminary treatment 630 one group 4 to 4 wavefront cover with the four groups of output images converting to of four groups of input pictures (image that S (t) is relevant with E5 (t) with three groups) by transmission; Comprise Es (t).
E5 (t) select after and the additional treatments (not shown) be sent between three input ports can be used as an example.This three width can be served as by the digital image after the flip vertical of E5 (t) at first width of the E5 (t) of input, second width be by E5 (t) flip horizontal after digital image serve as, and the 3rd width is served as by the digital image after E5 (t) 90 degree turns clockwise.In addition, with in 3 input ports of three width E5 (t) digital images by suitable weighting, so that the vision for human body of output image Es (t) and the sense of hearing are identical with E5 (t) substantially.
Four groups of images exported, comprise Es (t), only have one group can be stored in high in the clouds.We select Es (t) in the present embodiment.To the photo that cloud stores, smart phone user can have multiple choices; Selection is like this directly through the backup photo service provided by cloud storage operator, and this service is the accreditation processes needing to store through cloud operator.These backup photos can use the form of secret protection; As number seals up the form of rear photo.Another kind of possible selection, can add number photo Es (t) of being honored as a queen by user and be dragged in an autosynchronous local folder 1711 and re-send to high in the clouds 010.Automatic synchronization is through smart mobile phone cloudland face 1721 and utilizes mobile portable phone frequency band or ISM band radio to connect, or through being wiredly connected to internet in high in the clouds 010.Consequently, image S (t) the most at last number add the form of photo Es (t) of being honored as a queen and be stored in high in the clouds 010.The process that corresponding solution is sealed up in the reprocessing 640 recovering photo as shown in fig. 20b, if do not have original digital envelope E5 (t) in the candidate's envelope literary composition File 180 stored local, it is the original photo S's (t) that cannot be converted to reconstruction that the number be stored in high in the clouds 010 adds photo Es (t) of being honored as a queen.Therefore, digital photograph is stored in the privacy that form that number adds photo of being honored as a queen enhances storage picture.
Number seal up can use dual or triple envelope add encapsulation technique, or cover use through the wavefront of high-order; Or both combination even as previously discussed.
Solution shown in Figure 20 B seals up block diagram, user can through the smart mobile phone of oneself or through its PC obtain be stored in high in the clouds 010 add photo Es (t) of being honored as a queen.Photo Es (t) of being honored as a queen can do solution by reprocessing 640 again and sealed up conversion process and rebuild original image S (t) adding of obtaining.S (t) is the photo of Zhang chorus performance.Solution as shown in the figure in reprocessing 640 digital envelope E5 (t) of sealing up needed for conversion includes 3 kinds of different forms; The number of E5 (t) original image, the number of E5 (t) image after rotating, and the number of rear E5 (t) image of upset.E5 (t) is the galloping horse figure of the sad letter of width Xu.In a certain receiver, what obtain adds photo Es (t) of being honored as a queen, and relevant to former digital envelope E5 (t) 3 groups of digital documents carrying out a set of solution by reprocessing 640 seals up process simultaneously.This cover solution seal up process be utilize one group 4 to 4 front wave solutions cover with conversion.Its four Output rusults value one will be original image S (t) rebuild.Picture after restructuring will be presented on portable display or PC screen or printer and print.
Supplement suggestion
As in the application covered at above-mentioned relevant wavefront, a certain wavefront covers and also can substitute with first group of non-orthonormal matrix the wavefront performing multichannel input signal with device and cover with conversion.As in the application covered in above-mentioned relevant front wave solutions, a certain front wave solutions is covered and can be substituted with the second non-orthonormal matrix the front wave solutions performing multichannel input signal with device and cover with conversion.Wherein, the second non-orthonormal matrix is the inverse matrix of the first non-orthonormal matrix.
Above-mentioned assembly, step, feature, the benefit discussed and advantage are only exemplary.Any pattern they and be not used to the scope limiting protection about their discussion.Other embodiments many also can be considered.These comprise embodiment and have less, additional, and/or different parts, step, feature, benefit and advantage.These are also included within assembly wherein, and/or the arrangement of step, and/or the different embodiment that sorts.
Except as otherwise noted, arrange measurements all in this manual, be worth, ratio, position, size, size, and other specifications, be included in the specification of following claim, is all approximate description, instead of describes accurately.Their object be the function that has in a rational scope with they about and what is usual technology with, being consistent belonging to them.In addition, except as otherwise noted, the object of number range is provided to be comprise described lower limit and higher limit.In addition, except as otherwise noted, the selection of all material and numerical value are representational preferred embodiment; Other number range and/or material can be used in different embodiments.
More than illustrate just illustrative for the purpose of the present invention, and nonrestrictive, and those of ordinary skill in the art understand; when not departing from the spirit and scope that following claims limit, many amendments can be made, change; or equivalence, but all will fall within the scope of protection of the present invention.

Claims (20)

1. there is a set of cell phone apparatus of transport and storage digital photograph function between camera and this locality digital photo album; It is characterized in that, Bao Kuo ︰
One group of preprocessor being connected to camera described in described mobile phone,
Wherein said preprocessor is configured to perform the conversion being input to multiple-channel output from multichannel;
Wherein said multiple input, it comprises the Article 1 inlet flow for embedding digital photos, and as the Article 2 data flow of digital envelope file;
First output of wherein said preprocessor comprises one the data flow adding digital photograph of being honored as a queen,
Wherein saidly add the digital photograph of being honored as a queen, also comprise the weighted sum of described first and second input data flow; First output is exported to add the photo eigen that the bitstream of being honored as a queen occurs substantially identical with the photo eigen that the second inlet flow occurs for the sense organ of human body,
A local photo album in described cell phone apparatus;
, a local transmission channel; This channel is configured to connect the first output of described preprocessor and the described local photo album of described cell phone apparatus;
A set of display; This display is configured to be connected to described local photo album;
One group of preprocessor; Be configured to be connected between described local photo album and described display.
2. in data system as claimed in claim 1, it is characterized in that, described preprocessor is also configured to perform the conversion being input to multiple-channel output from multichannel; The input of wherein said multichannel comprises receiving and to export from first of described preprocessor and to add bitstream of being honored as a queen described in being stored in described local photo album, and wherein first via output comprises the concealed digital photograph that recovery is heavily received.
3. cell phone apparatus as claimed in claim 2, is characterized in that, described preprocessor is more configured to export the concealed digital photograph of the recovery described in sending to the described display of described mobile device from described first of described preprocessor.
4. cell phone apparatus as claimed in claim 1, it is characterized in that, described preprocessor is more further configured to select one to be stored in adding in described local photo album and is honored as a queen digital photograph and the digital photograph selected described in sending again on the display described in described cell phone apparatus.
5. cell phone apparatus as claimed in claim 1, it is characterized in that, the conversion being input to multiple-channel output from multichannel in described preprocessor also comprise the multichannel input preferential weighting in Zhong mono-tunnel made the video of multichannel digital output form or audio appearance for the video of human body and the input bitstream form of preferential weighting or audio appearance substantially identical.
6. cell phone apparatus as claimed in claim 1, is characterized in that, in the described conversion of described preprocessor, also comprises a set of wavefront and covers with process one group of orthogonal matrix conversion used.
7. cell phone apparatus as claimed in claim 6, is characterized in that, described orthogonal matrix conversion more comprises one group of Fourier transform.
8. cell phone apparatus as claimed in claim 6, is characterized in that, described orthogonal matrix conversion more comprises one group of sea aunt's conversion.
9. cell phone apparatus as claimed in claim 1, is characterized in that, also comprises one group of nonopiate non-singular matrix conversion that a set of wavefront multiplexing process is used in the described conversion of described preprocessor.
10. cell phone apparatus as claimed in claim 1, is characterized in that, comprises a given data collection to the multichannel input described in described preprocessor.
11. cell phone apparatus as claimed in claim 1, is characterized in that, be grounded a road of the multiple-channel output described in described preprocessor.
12. cell phone apparatus as claimed in claim 1, is characterized in that, the described multichannel input of described pretreatment unit also comprises verification msg collection.
13. a set of photo storage and transportation systems, is characterized in that, Bao Kuo ︰
One group of preprocessor is connected to a digital camera in a signal source, and wherein said preprocessor is configured to perform the conversion being input to multiple-channel output from multichannel;
Wherein said multi-channel input, it comprises the first inlet flow for inputting concealed digital photograph, and one as digital envelope file second data flow;
The multiple-channel output of wherein said preprocessor comprises a road and exports the first output adding the digital photograph of being honored as a queen,
The wherein said weighted sum adding the digital photograph of being honored as a queen and also comprise described first and second inlet flows; The numerical characteristic that this weighted sum form is occurred is substantially identical with the digital photograph of the second inlet flow for human body;
One is configured to distributed storage photo album beyond the clouds;
, first transmission channel; Be configured to be connected in the first output at described preprocessor described photograph album in described high in the clouds.
14. systems as claimed in claim 13, is characterized in that, draw together a set of wavefront of ︰ and cover with the one group of orthogonal matrix conversion in process converting also bag described in described preprocessor.
15. systems as claimed in claim 14, is characterized in that, described orthogonal matrix conversion, also comprises one group of Fourier transform.
16. systems as claimed in claim 14, is characterized in that, described orthogonal matrix conversion, also comprise one group of sea aunt's conversion.
17. systems as claimed in claim 13, is characterized in that, convert described in described preprocessor, and also bag is drawn together a set of wavefront of ︰ and covered with one group of nonopiate non-singular matrix conversion in process.
18. systems as claimed in claim 13, is characterized in that, comprise a road given data collection with the input of the multichannel of described preprocessor.
19. systems as claimed in claim 13, is characterized in that, the tunnel of multiple-channel output Zhong mono-described in described preprocessor is grounded.
20. a set of photos return to be got and transmission system, it is characterized in that, Bao Kuo ︰
One group is connected to the preprocessor of digital display in destination, and wherein said preprocessor is configured to perform the conversion being input to multiple-channel output from multichannel;
Wherein said multi-channel input, comprises the first inlet flow adding photo of being honored as a queen for inputting a string number, and a string the second data flow as digital envelope file;
First output of wherein said preprocessor comprises the digital photograph of one group of recovery and rebuilding one-tenth,
The photo of wherein said recovery and rebuilding, also comprise the weighted sum of described first and second inputs, wherein, the digital form of the second inlet flow described in described preprocessor occurs having and described first inlet flow identical digital form characteristic substantially human visual sense organ;
One group is configured to the digital photo album being stored in the storage of distributed cloud;
Article one, be configured to the second tunnel transmission channel connecting the first input end of described reprocessing and the digital photo album in cloud storage;
Described in the described preprocessor that set of number display is configured to be connected to described destination, the first via exports.
CN201510501840.0A 2014-08-18 2015-08-14 Digital encapsulation for digital image and video Pending CN105376597A (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201462038767P 2014-08-18 2014-08-18
US62/038,767 2014-08-18
US14/685,651 US20160048697A1 (en) 2014-08-18 2015-04-14 Enveloping and de-enveloping for Digital Photos via Wavefront Muxing
US14/685,651 2015-04-14

Publications (1)

Publication Number Publication Date
CN105376597A true CN105376597A (en) 2016-03-02

Family

ID=55378334

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510501840.0A Pending CN105376597A (en) 2014-08-18 2015-08-14 Digital encapsulation for digital image and video

Country Status (2)

Country Link
CN (1) CN105376597A (en)
TW (1) TW201619864A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110197740A1 (en) * 2010-02-16 2011-08-18 Chang Donald C D Novel Karaoke and Multi-Channel Data Recording / Transmission Techniques via Wavefront Multiplexing and Demultiplexing
US20120319885A1 (en) * 2011-06-16 2012-12-20 Spatial Digital Systems System for processing data streams
TW201325247A (en) * 2011-11-07 2013-06-16 Samsung Electronics Co Ltd Inverse transformation method and inverse transformation apparatus for clipping data during inverse quantization and inverse transformation in video decoding process
US20140081989A1 (en) * 2012-07-30 2014-03-20 Steve K Chen Wavefront muxing and demuxing for cloud data storage and transport

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110197740A1 (en) * 2010-02-16 2011-08-18 Chang Donald C D Novel Karaoke and Multi-Channel Data Recording / Transmission Techniques via Wavefront Multiplexing and Demultiplexing
US20120319885A1 (en) * 2011-06-16 2012-12-20 Spatial Digital Systems System for processing data streams
TW201325247A (en) * 2011-11-07 2013-06-16 Samsung Electronics Co Ltd Inverse transformation method and inverse transformation apparatus for clipping data during inverse quantization and inverse transformation in video decoding process
US20140081989A1 (en) * 2012-07-30 2014-03-20 Steve K Chen Wavefront muxing and demuxing for cloud data storage and transport

Also Published As

Publication number Publication date
TW201619864A (en) 2016-06-01

Similar Documents

Publication Publication Date Title
CN102867530B (en) For providing the method and apparatus of the auxiliary media in digital cinema composition playlist
JP5897570B2 (en) Method and system for watermark protection against unauthorized use of presented original audio or video data
US10516872B2 (en) Digital enveloping for digital right management and re-broadcasting
Qu et al. Novel quantum watermarking algorithm based on improved least significant qubit modification for quantum audio
CN103973937A (en) Information hiding method based on wireless multimedia sensor network
US10264052B2 (en) Enveloping for device independence
US10320994B2 (en) Enveloping for cloud computing via wavefront muxing
Yuan et al. On the security of encrypted jpeg image with adaptive key generated by invariant characteristic
US10289856B2 (en) Digital enveloping for digital right management and re-broadcasting
CN107169911A (en) A kind of image encryption method converted based on Arnold transformation
CN102158768B (en) MP4 file encapsulation format-based video authentication watermark embedding and extraction method
US20160048697A1 (en) Enveloping and de-enveloping for Digital Photos via Wavefront Muxing
CN116156072B (en) Steganographic image generation method, steganographic information extraction method and related devices
CN105376597A (en) Digital encapsulation for digital image and video
US20160048701A1 (en) Enveloping for remote Digital Camera
US20160048371A1 (en) Enveloping via Digital Audio
CN105373736A (en) Enveloping via Digital Audio
CN105376600A (en) Digital encapsulation with equipment independence
CN105376599A (en) Digital encapsulation of remotely controlled IP camera
Wu et al. Securing graph steganography over social networks via interaction remapping
CN105376598A (en) Digital encapsulation applied to cloud computing through before wave encapsulation
CN103533457B (en) Multimedia digital watermark embedding and separation method and device
Nasution et al. A comparison of joint reversible data hiding methods in encrypted remote sensing satellite images
Tang et al. High capacity reversible data hiding for encrypted 3d mesh models based on topology
Raja et al. Deep Steg Block: Deep Learning-Enhanced Steganography for Secure Communication in IoT Devices Using Blockchain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160302

WD01 Invention patent application deemed withdrawn after publication