EP1388230A2 - Procede et dispositif destines au cryptage d'un signal discret, et procede et dispositif de decryptage - Google Patents
Procede et dispositif destines au cryptage d'un signal discret, et procede et dispositif de decryptageInfo
- Publication number
- EP1388230A2 EP1388230A2 EP02751172A EP02751172A EP1388230A2 EP 1388230 A2 EP1388230 A2 EP 1388230A2 EP 02751172 A EP02751172 A EP 02751172A EP 02751172 A EP02751172 A EP 02751172A EP 1388230 A2 EP1388230 A2 EP 1388230A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- data blocks
- successive
- order
- coded data
- predetermined
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
- H04K1/06—Secret communication by transmitting the information or elements thereof at unnatural speeds or in jumbled order or backwards
Definitions
- the present invention relates to the encryption of discrete signals, e.g. on the encryption of voice information or the corresponding decryption.
- the encrypted signals must not cause any damage when listening without decrypting the listening system.
- the encrypted signals should therefore be encrypted in such a way that they do not produce any crackling, crackling or other extreme dynamic jumps when played without decryption. While it is often sufficient to encrypt the quality of the unauthorized reproduction when encrypting music data, ' with speech content it is particularly required that the reproduction quality of the encrypted data with unauthorized use does not make the speech information understandable, which can be interviews, reports, etc., for example allow more.
- the object of the present invention is to provide a method and a device for encrypting a discrete signal as well as a method and a device for corresponding decryption, so that the encryption on the one hand is as secure as possible and on the other hand does not produce any errors in unauthorized processing and with previous encodings is tolerated.
- the present invention is based on the knowledge that a very high level of security of the encryption can be achieved by introducing a temporal discontinuity, and that the occurrence of errors in the case of unauthorized processing of such encrypted signals can thereby be prevented and the compatibility with standard encodings can be ensured in that the change in the temporal order after coding the discrete signal, ie with respect to coded data blocks into which an encoder encodes the discrete signal, is carried out. In this way, on the one hand, it is prevented that a decoder, which receives the encrypted signal, does not get into undefined states, since during the encryption the temporal discontinuity is generated in units of coded data blocks.
- the successive samples of a discrete signal are divided into successive time blocks, which are then encoded in coded data blocks with a predetermined order.
- the predetermined sequence of the coded data blocks is then changed in accordance with a predetermined exchange rule.
- the order of the coded data blocks of an encrypted signal which corresponds to a discrete signal, which consists of successive samples, in encrypted form, is changed according to a predetermined exchange rule or an inverse exchange rule, whereupon the encoded data blocks are changed Order are decoded into successive time blocks with a predetermined order.
- the successive samples of the discrete signal are generated from the successive time blocks.
- the change in the predetermined sequence of the encoded data blocks during encryption is achieved by permuting a predetermined number of successive data blocks of the encoded data blocks, a permutation vector being generated as a swapping rule for this purpose.
- the permutation can be carried out with respect to successive groups of coded data blocks of the same size or length.
- a different permutation vector can be generated and used for each permutation group.
- the generation of the permutation vectors takes place in the decoding in a predetermined way, with a correct decryption there by ensuring that corresponding inverse permutation vectors are generated and used in the decryption for the back permutation of the groups of coded data blocks.
- FIG. 1 shows a block diagram of an encryption device according to an exemplary embodiment of the present invention
- FIG. 2 shows a block diagram of a decryption device according to an exemplary embodiment of the present invention
- Fig. 3 is a schematic sketch showing an exemplary embodiment of encryption.
- Fig. 4 is a schematic sketch showing an exemplary embodiment of a decryption.
- 1 shows an encryption device according to an embodiment of the present invention, which converts a discrete time signal or an audio signal into coded data blocks in encrypted form.
- 1 essentially comprises a psychoacoustic encoder 10 which receives the time signal and converts it into coded data blocks, and a device 12 for changing the order of the coded data blocks.
- the psychoacoustic encoder 10 comprises a device 14 for dividing the successive discrete samples which make up the time signal into time blocks and a device 16 for coding the time blocks into coded data blocks.
- the device 12 for changing the sequence comprises a device 18 for generating a permutation vector, a writing device 20, a first buffer 22, a second buffer 24 and a readout device 26.
- An input of the writing device 20 is connected to an output of the psychoacoustic encoder 10 or Device 16 connected for coding, while two outputs of the same are each connected to an input of the first and second buffers 22 and 24.
- An output of the device 18 for generating a permutation vector is connected to an input of the readout device 26 in order to output a permutation vector thereon, the readout device having two further inputs which are connected to the outputs of the intermediate memories 22 and 24.
- the read-out device 26 is connected at an output to an output buffer 28 in order to output coded data blocks to it in encrypted form.
- the time signal is a discrete audio signal that consists of successive samples.
- the psychoacoustic encoder 10 is based, for example, on an encoding method of the AAC standard.
- the device 14 divides the successive samples, for example, into time blocks with a number of successive samples which is equal to a power of 2. To handle aliasing effects, provision can be made for a division into mutually overlapping time blocks, so that each sample value has two time intervals. block is allocated, as is the case with AAC coding, for example.
- the device 16 for coding the time blocks into coded data blocks receives the time blocks from the device 14 in chronological order and then carries out the coding thereof.
- the coding of a time block can be carried out either individually or in isolation, time block by time block, or depending on previous and subsequent time blocks, in order, for example, to use psychoacoustic models, e.g. the temporal and spectral concealment to be taken into account.
- the device 16 for encoding the time blocks outputs the encoded data blocks to the writing device 20 in a predetermined sequence which is dependent on the encoding method.
- the data blocks can either all have the same length or different lengths, e.g. in the event that the data blocks have an MPEG2 / 4 AAC compliant structure.
- the writer 20 receives the encoded data blocks and successively writes the encoded data blocks into a current one of the buffers 22 and 24, acting together as a removable buffer, as will be described below.
- the size of the buffers 22 and 24 is sufficiently large to store N coded data blocks, where N is an integer greater than 1 (N> 1).
- the writing device 20 writes the current one of the memories 22 and 24 in the order in which the coded data blocks are transmitted by the device 16 until there are N coded data blocks in the current one of the buffers 22 and 24.
- the read-out device 26 reads out the buffer 22 and 24 just filled, while the write device 20 reads the other of the two buffers 22 and 24 with the coded data blocks from the Device 16 describes in the order of their receipt.
- the read-out device 26 reads out the buffer memory 22 or 24, which was last completely described, in a different order than the same was described.
- the read-out device 26 reads out the respective intermediate memory 22 or 24 in a permuted sequence, which is determined by a permutation vector of size N, which is generated and supplied by the device 18 for generating a permutation vector, as will be described below .
- a permutation vector of size N which is generated and supplied by the device 18 for generating a permutation vector, as will be described below .
- the coded data blocks read out in permuted order together form a permutation group of coded data blocks which the readout device 26 outputs to the output buffer 28, to which, for example, a computer interface (not shown) is connected.
- the device 18 generates the permutation vector of size N, which defines the exchange rule, on the basis of which the coded data blocks of a permutation group are permuted, for each permutation group.
- the generation of a permutation vector is based on N pseudo random numbers that are generated by the pseudo random number generator 30.
- the pseudo-random number generator 30 generates N pseudo-random numbers in succession for the generation of each permutation vector of length N and outputs them to the sorter 34, the counter 32 incrementing a counter value when each pseudo-random number is output and outputting it to the reorderer 36, the counter 32 having a value starts from 0 to output a value of 1 for the first pseudorandom number.
- the pseudo-random numbers that are output by the pseudo-random number generator 30 are numbered in parallel with the generation or provided with indices in the order in which they were generated.
- the pseudo-random numbers generated by the pseudo-random number generator 30 together form a random number vector or a random number array of N pseudo-random numbers, while the numbers generated by the counter 32 form an index vector or an index array which consists of numbers from 1 to N.
- the sorter 34 receives the random number vector and sorts it using a suitable sorting method, for example in increasing order.
- the sorter 34 is coupled to the reorder 36 to allow the reorder 36 to reorder the index vector received from the counter 32 in parallel with the sorting of the random number vector.
- the rearranged or permuted index array generated by the reorderer 36 represents the swapping rule for the N coded data blocks that are read next by the readout device and is output by the reorderer 36 as a permutation vector to the readout device 26, which is the same , as described above, used to define the readout order with respect to the corresponding buffer 22 or 24.
- the write device 20 and the read-out device 26 change to the respective one other buffers 22 and 24, respectively, the reading process being carried out with respect to the new coded data blocks written in the change buffer, which are then output to the output buffer in permuted order.
- the output buffer in permuted order.
- a decryption device according to an exemplary embodiment of the present invention is explained below with reference to FIG. 2.
- the decryption device of FIG. 2 is provided in order to transmit the encoded data blocks of the encryption device which are output in encrypted form. 1 again in a time signal, depending on the coding used in a lossy or lossless manner.
- the device of FIG. 2 comprises a device 38 for changing the order of the received coded data blocks, which represent the encrypted signal, and a decoder 40, which is connected to the device 38 and decodes the coded data blocks.
- the device 38 has an arrangement similar to the device 12 of the encryption device of FIG. 1, and consists of a writing device 42, a buffer 1 44, a buffer 2 46, a read-out device 48 and a device 50 for generating an inverse permutation vector 1, which has a structure similar to the device 18 of the encryption device of FIG. 1 and is therefore not shown in more detail in FIG. 2 for reasons of clarity.
- the writing device 42 receives the coded data blocks, which are present in the encrypted form, at an input and is connected to an input of the buffer memory 44 or of the buffer memory 46 at two outputs.
- the readout device comprises three inputs, one of which is connected to an output of the device 50 for generating an inverse permutation vector and the other two are each connected to an output of the buffer memory 44 and 46, respectively.
- An output of the readout device 48 is connected to the decoder 40 to transmit the decoded data blocks in a predetermined order, i.e. in the order intended for decoding according to the respective coding method.
- the decoder 40 comprises a device 52 for decoding the coded data blocks which are output by the read-out device 48, and a device 54 following the device 52 for forming the successive samples, the device 54 receiving the time signal. outputs for example to a digital / analog converter (not shown) or the like.
- the writer 42 receives the encoded data blocks, which are in encrypted form, and outputs them in the order in which they are transmitted to a current one of the buffers 44 and 46 which, like the encryption device of Fig. 1, cooperate as a removable buffer. While the writing device 42 fills one of the two buffers 44 and 46 in succession with N coded data blocks, the reading device 48 reads out the other buffer. While one buffer is being filled with the coded data blocks in the transmission order, the reading of the other buffer is carried out in permuted order, which depends on the inverse permutation vector generated by the device 50.
- An inverse permutation vector means here that the interchanging rule generated by the inverse permutation vector reverses the interchanges that were made by the decryption device of FIG. 1 on a respective interchanging or permutation group of N-coded data blocks.
- the device 50 generates the inverse permutation vectors per readout, for example using the same arrangement of devices as is shown for the device 18 in FIG. 1, the device 50, however, from the permutation vector as generated by the device 18 by a suitable device generates an inverse permutation vector, for example by applying the interchange rule defined by the permutation vector to a vector as it is output by the counter (see 32 in FIG. 1), ie a vector of ordered numbers from 1 to N.
- the N coded data blocks read out in a permuted order by the read-out device 48 are fed to the device 52 for decoding the coded data blocks, the same now being present in the predetermined order which is necessary for decoding the coded data blocks in accordance with the coding method on which the decoder 44 is based to get the correct time signal.
- the read-out device 48 After the read-out device 48 has read out the respective intermediate store or the write device 42 has completely filled the other intermediate store, the read-out device reads out the intermediate store which has just been filled by the write device 42, while the write device 42 describes the intermediate store which has been read out by the read-out device 48 ,
- the device 52 decodes the encoded data blocks and outputs time blocks in a predetermined order.
- the device 54 receives the time blocks and uses them to form the successive samples from which the time signal is made, and outputs them, for example, to an analog / digital converter (not shown).
- FIGS. 3 and 4 After exemplary embodiments for an encryption or decryption device have been described in the foregoing, an explicit embodiment is described below with reference to FIGS. 3 and 4, in which a discrete signal is encrypted by the device of FIG. 1 into an encrypted signal and the latter is decrypted by the device of FIG. 2, with additional reference being made to FIGS. 1 and 2.
- each sample can be located in one or more of the time blocks 66, or the time blocks can overlap one another in order to eliminate aliasing artifacts.
- each encoded data block 70 can have an individually different length or size, as illustrated by the different sizes of the blocks.
- a state is shown at 72 as it arises for the successive coded data blocks 70 during the encryption in the encryption device of FIG. 1.
- state 72 as in the following states in FIG. 3, in particular the contents of the buffer store 1 (22 in FIG. 1), the buffer store 2 (24 in FIG. 1) and the output buffer (28 in FIG. 1 ) for the respective state.
- the state is shown for the exemplary case that the exchange group size is set to 5 during encryption or decryption.
- the state shown at 72 corresponds to the state as it arises in the device of FIG. 1 after the first five A-Es have been written by the data blocks 70 at 68 into the active or current buffer, in this case buffer 1 have been.
- the values in the buffer 2 and the output buffer may depend on previous coded data blocks, and are therefore shown with dashes. As can be seen, the coded data blocks A-E have been stored in the buffer 1 in their predetermined sequence.
- the state is shown as it results after five further coded data blocks.
- the 5 further coded data blocks F - J have been written into the buffer 2, while the coded data blocks stored in the buffer 1 have been read out into the output buffer.
- the permutation vector, as indicated at 76, has been used for reading out the coded data blocks stored in the buffer 1. (4,3,5,2,1).
- the permutation vector 76 assigns each coded data block in the buffer 1 a number between 1 to 5 or N which indicates the readout order or the position at which this coded data block is to be written into the output buffer, so that in the Output buffer the encoded data blocks AE are in the order EDBAC.
- the state is shown after a further 5 coded data blocks.
- the 5 subsequent coded data blocks K-0 have in turn been written into the buffer 1, while in the meantime the buffer 2 has been read out into the output buffer by means of a permutation vector 80 (5,1,3,2,4) is where the encoded data blocks result in the order GIHJF.
- the stream or the sequence of coded data blocks is shown in encrypted form, as they are input into or output from the output buffer 28.
- the coded data blocks are scrambled compared to the predetermined order in which they are usually output by the coding on which the encoder 10 is based, which is why in the event that the audio data carries speech information this speech information is incomprehensible when decoded without decryption according to the present invention. Nevertheless, decoding without decryption prevents the decoder from entering invalid states, since the temporal discontinuity is defined in units of encoded data blocks.
- IMDCT inverse modified discrete cosine transform
- the signal 82 is received by a decoder or a decryption device according to FIG. with a corresponding inverse exchange of the input data, decrypted, then the data blocks or the data frames are again in the correct order in the buffer and the subsequent decoding can be carried out in accordance with the standard.
- This decryption process is explained in more detail with reference to FIG. 4 for the explicit embodiment of FIG. 3.
- FIG. 4 shows at 84 an example of a sequence of coded data blocks in encrypted form, which in this case corresponds to that of FIG. 3 at 82.
- Shown at 86 is a state that occurs in the decryption device of FIG. 2 after it has received the first five of the encoded data blocks of 84.
- the content of the buffer store 1 (44 in FIG. 2)
- the content of the buffer store 2 (46 in FIG. 2)
- the sequence of coded ones Blocks of data output from device 38 to encoder 40 are shown.
- the decoded data blocks are placed in the current buffer, in this case buffer 1, in the order in which they are transmitted.
- the state is shown at 88 as it arises after five further coded data blocks FGHIJ.
- the next five coded data blocks have been written into the buffer 2, while by means of an inverse permutation vector 90 the coded data blocks EDBAC are read out from the buffer 1 in order to be transmitted to the decoder 40 in the order ABCDE, whereby the inverse permutation vector results from the permutation vector 76 of FIG. 3, which related to the same permutation group, by applying the latter as a swapping rule to a vector (1,2,3,4,5).
- the state is shown at 92 as it results from the stream of coded data blocks 84 after reading out a further five coded data blocks.
- the buffer 1 has again been filled with the following coded data blocks K - 0, while the coded data blocks GHIJF in the buffer 2 have been read out to the decoder and output in a permuted sequence or inversely permuted sequence FGHIJ.
- the back permutation is based on the inverse permutation vector 94, which results from the permutation vector 80 of FIG. 3 by applying the latter to a vector (1,2,3,4,5).
- the stream of successive encoded data blocks is shown as it is fed to the decoder.
- the order in which the encoded data blocks have been output by the encoder of the encryption device is restored, ie ABCDEFGHIJKLMN ..., so that the decoding can be carried out in accordance with the standards.
- the description provided above with reference to FIGS. 1 to 4 related to encryption which is based on the exchange of data blocks of the time signal within a block group or exchange group.
- the block swapping in the time domain destroys the temporal modulation of a speech signal in such a way that intelligibility is considerably reduced in the case of a speech signal.
- An advantage of the above exemplary embodiments is that although a psychoacoustic compression method is used in the preceding exemplary embodiments to encode the time signal, the assumptions on which this psychoacoustic compression method is based, such as, for example, about the temporal and spectral concealment, remain valid since the temporal discontinuity is only is generated after compression, ie the chronological order of the already encoded data frames is exchanged.
- the exemplary embodiments described above can basically be used for all encoded data streams which are based on a sequential sequence of data frames which are self-contained and overlap after coding.
- the speech incomprehensibility of the encrypted signal can be improved in that the psychoacoustic encoder 10 or a device between the same and the device for changing the order a frequency range scrambling according to the in the Introduction to the mentioned patent application W099 / 51279.
- the present invention both in hardware, such as, for example, as an ASIC, an integrated circuit or the like, and in software, such as, for example, as a PC Software that can be implemented.
- the present invention has been applied to the encryption of audio ten or voice signals has been described, the present invention is generally applicable to all areas in which discrete signals are used and where appropriate coding thereof takes place, such as in image and video processing or data transmission in general.
- the coding preceding the generation of the temporal discontinuity in the encryption is not limited to a psychoacoustic coding.
- JPEG encoding is also possible for image or video data.
- the present invention can be implemented with all coding methods that subdivide successive discrete samples into time blocks and code them into coded data blocks or frames or directly code existing time blocks.
- the exact implementation of the device for generating a permutation vector can also be implemented differently, such as e.g. especially with regard to the length of the exchange group N or the number and size of the buffers used.
- the device for generating a permutation vector can be implemented differently than described above.
- the permutation vector could be the same for all exchange groups, in which case the inverse permutation vector would also be fixed.
- the principle of permuting successive exchange groups used in the previous exemplary embodiments can be deviated from, and that the order change can also be carried out in other ways, such as e.g. by changing the order with respect to the entire coded data blocks, in which case it would be necessary to temporarily store all the coded data blocks before changing the order in the encryption and to store the entire coded data blocks before changing the order in the decryption.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Compression, Expansion, Code Conversion, And Decoders (AREA)
- Storage Device Security (AREA)
- Communication Control (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Facsimile Transmission Control (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE10138650A DE10138650A1 (de) | 2001-08-07 | 2001-08-07 | Verfahren und Vorrichtung zum Verschlüsseln eines diskreten Signals sowie Verfahren und Vorrichtung zur Entschlüsselung |
DE10138650 | 2001-08-07 | ||
PCT/EP2002/008661 WO2003015328A2 (fr) | 2001-08-07 | 2002-08-02 | Procede et dispositif destines au cryptage d'un signal discret, et procede et dispositif de decryptage |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1388230A2 true EP1388230A2 (fr) | 2004-02-11 |
EP1388230B1 EP1388230B1 (fr) | 2005-02-16 |
Family
ID=7694608
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP02751172A Expired - Lifetime EP1388230B1 (fr) | 2001-08-07 | 2002-08-02 | Procede et dispositif destines au cryptage d'un signal discret, et procede et dispositif de decryptage |
Country Status (6)
Country | Link |
---|---|
US (1) | US8520843B2 (fr) |
EP (1) | EP1388230B1 (fr) |
AT (1) | ATE289461T1 (fr) |
DE (2) | DE10138650A1 (fr) |
HK (1) | HK1059518A1 (fr) |
WO (1) | WO2003015328A2 (fr) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7933405B2 (en) * | 2005-04-08 | 2011-04-26 | Icera Inc. | Data access and permute unit |
US7450040B2 (en) * | 2006-03-20 | 2008-11-11 | Marvell International Ltd. | Method and apparatus for generating non-binary balanced codes |
ITRM20070010A1 (it) * | 2007-01-09 | 2008-07-10 | Telecomponenti S R L | Metodo di elaborazione di un segnale digitale e sistema utilizzante tale metodo. |
US8700406B2 (en) * | 2011-05-23 | 2014-04-15 | Qualcomm Incorporated | Preserving audio data collection privacy in mobile devices |
US11036561B2 (en) * | 2018-07-24 | 2021-06-15 | Oracle International Corporation | Detecting device utilization imbalances |
Family Cites Families (57)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CH518658A (de) * | 1970-07-07 | 1972-01-31 | Patelhold Patentverwaltungs Un | Verfahren zur verschlüsselten Nachrichtenübermittlung durch zeitliche Vertauschung von Informationselementen |
CH558993A (de) | 1973-03-19 | 1975-02-14 | Patelhold Patentverwertung | Verfahren und einrichtung zur verschluesselten nachrichtenuebertragung. |
CH559483A5 (fr) * | 1973-06-12 | 1975-02-28 | Patelhold Patentverwertung | |
US4232194A (en) * | 1979-03-16 | 1980-11-04 | Ocean Technology, Inc. | Voice encryption system |
US4278840A (en) * | 1979-03-23 | 1981-07-14 | Datotek, Inc. | Dynamic frequency and time voice encryption system and method |
US4443660A (en) * | 1980-02-04 | 1984-04-17 | Rockwell International Corporation | System and method for encrypting a voice signal |
US4393276A (en) * | 1981-03-19 | 1983-07-12 | Bell Telephone Laboratories, Incorporated | Fourier masking analog signal secure communication system |
JPS59111441A (ja) * | 1982-12-17 | 1984-06-27 | Sony Corp | 音声信号の秘話方式 |
US4612414A (en) * | 1983-08-31 | 1986-09-16 | At&T Information Systems Inc. | Secure voice transmission |
JPS6216639A (ja) * | 1985-07-16 | 1987-01-24 | Kokusai Denshin Denwa Co Ltd <Kdd> | 秘話音声信号送出装置 |
GB2182229B (en) * | 1985-10-25 | 1989-10-04 | Racal Res Ltd | Speech scramblers |
US5095525A (en) * | 1989-06-26 | 1992-03-10 | Rockwell International Corporation | Memory transformation apparatus and method |
US5339108A (en) * | 1992-04-09 | 1994-08-16 | Ampex Corporation | Ordering and formatting coded image data and reconstructing partial images from the data |
US5436940A (en) * | 1992-06-11 | 1995-07-25 | Massachusetts Institute Of Technology | Quadrature mirror filter banks and method |
US5303302A (en) * | 1992-06-18 | 1994-04-12 | Digital Equipment Corporation | Network packet receiver with buffer logic for reassembling interleaved data packets |
JPH0730855A (ja) * | 1993-07-08 | 1995-01-31 | Sony Corp | ビデオデータの記録方法 |
NZ277128A (en) * | 1993-12-01 | 1998-04-27 | William Michael Raike | Public key encryption system and mixture generator |
DE69532227T2 (de) * | 1994-07-15 | 2004-09-30 | Ntt Mobile Communications Network Inc. | Signalsendeverfahren und kommunikationssystem |
US5717819A (en) * | 1995-04-28 | 1998-02-10 | Motorola, Inc. | Methods and apparatus for encoding/decoding speech signals at low bit rates |
US5991308A (en) * | 1995-08-25 | 1999-11-23 | Terayon Communication Systems, Inc. | Lower overhead method for data transmission using ATM and SCDMA over hybrid fiber coax cable plant |
JP3823275B2 (ja) * | 1996-06-10 | 2006-09-20 | 富士通株式会社 | 動画像符号化装置 |
US6337879B1 (en) * | 1996-08-14 | 2002-01-08 | Sony Corporation | Video data compression apparatus and method of same |
US6134631A (en) * | 1996-08-19 | 2000-10-17 | Hyundai Electronics America, Inc. | Non-volatile memory with embedded programmable controller |
JP3496411B2 (ja) * | 1996-10-30 | 2004-02-09 | ソニー株式会社 | 情報符号化方法及び復号化装置 |
US6307940B1 (en) * | 1997-06-25 | 2001-10-23 | Canon Kabushiki Kaisha | Communication network for encrypting/deciphering communication text while updating encryption key, a communication terminal thereof, and a communication method thereof |
US20020002675A1 (en) * | 1997-08-06 | 2002-01-03 | Ronald Roscoe Bush | Secure encryption of data packets for transmission over unsecured networks |
US6356545B1 (en) * | 1997-08-08 | 2002-03-12 | Clarent Corporation | Internet telephone system with dynamically varying codec |
US6507672B1 (en) * | 1997-09-10 | 2003-01-14 | Lsi Logic Corporation | Video encoder for digital video displays |
FR2771581B1 (fr) * | 1997-11-26 | 1999-12-17 | Thomson Multimedia Sa | Procede d'embrouillage et procede de desembrouillage de donnees video numeriques et dispositifs mettant en oeuvre les procedes |
JP3722969B2 (ja) * | 1998-01-08 | 2005-11-30 | 株式会社東芝 | 再送制御方法及び再送制御装置 |
US7430257B1 (en) * | 1998-02-12 | 2008-09-30 | Lot 41 Acquisition Foundation, Llc | Multicarrier sub-layer for direct sequence channel and multiple-access coding |
US6650659B1 (en) * | 1998-02-27 | 2003-11-18 | Sony Corporation | Data transmitting method |
US6301268B1 (en) * | 1998-03-10 | 2001-10-09 | Lucent Technologies Inc. | Communication method for frequency division multiplexing signalling systems with reduced average power requirements |
AUPP276098A0 (en) | 1998-04-01 | 1998-04-30 | Nokuta Pty Ltd | A method for treating gelatine |
US6163576A (en) * | 1998-04-13 | 2000-12-19 | Lsi Logic Corporation | Video encoder having reduced memory bandwidth requirements |
CA2333095C (fr) * | 1998-06-03 | 2005-05-10 | Cryptography Research, Inc. | Perfectionnement de normes cryptographiques et autres procedes cryptographiques a reduction des fuites pour cartes a puces et autres systemes cryptographiques |
JP2000057695A (ja) * | 1998-08-13 | 2000-02-25 | Sony Corp | 情報記録再生装置および方法、並びに提供媒体 |
JP3748717B2 (ja) * | 1998-08-31 | 2006-02-22 | シャープ株式会社 | 動画像符号化装置 |
US6985722B1 (en) * | 1998-09-25 | 2006-01-10 | Soma Networks, Inc. | Telecommunication services |
CA2347011A1 (fr) * | 1998-10-28 | 2000-05-04 | Ellwood Mcgrogan | Appareil et procedes de synchronisation cryptographique dans des communications par paquets |
JP2000138897A (ja) * | 1998-10-30 | 2000-05-16 | Sony Corp | データ処理装置およびデータ記録装置 |
US6445797B1 (en) * | 1998-12-16 | 2002-09-03 | Secure Choice Llc | Method and system for performing secure electronic digital streaming |
EP1021048A3 (fr) * | 1999-01-14 | 2002-10-02 | Kabushiki Kaisha Toshiba | Système d'enregistrement vidéo numérique et son moyen d'enregistrement |
US6226608B1 (en) * | 1999-01-28 | 2001-05-01 | Dolby Laboratories Licensing Corporation | Data framing for adaptive-block-length coding system |
DE19907964C1 (de) * | 1999-02-24 | 2000-08-10 | Fraunhofer Ges Forschung | Vorrichtung und Verfahren zum Erzeugen eines verschlüsselten Datenstroms und Vorrichtung und Verfahren zum Erzeugen eines entschlüsselten Audio- und/oder Videosignals |
FI116992B (fi) * | 1999-07-05 | 2006-04-28 | Nokia Corp | Menetelmät, järjestelmä ja laitteet audiosignaalin koodauksen ja siirron tehostamiseksi |
FI116643B (fi) * | 1999-11-15 | 2006-01-13 | Nokia Corp | Kohinan vaimennus |
US6642885B2 (en) * | 1999-12-10 | 2003-11-04 | Nokia Corporation | Receiver for a satellite based position location system |
GB2358098A (en) * | 2000-01-06 | 2001-07-11 | Sharp Kk | Method of segmenting a pixelled image |
US20020009000A1 (en) * | 2000-01-18 | 2002-01-24 | Qdesign Usa, Inc. | Adding imperceptible noise to audio and other types of signals to cause significant degradation when compressed and decompressed |
US7047196B2 (en) * | 2000-06-08 | 2006-05-16 | Agiletv Corporation | System and method of voice recognition near a wireline node of a network supporting cable television and/or video delivery |
US20020076049A1 (en) * | 2000-12-19 | 2002-06-20 | Boykin Patrick Oscar | Method for distributing perceptually encrypted videos and decypting them |
ES2184587B1 (es) * | 2000-12-18 | 2004-08-01 | Diseño De Sistemas En Silicio, S.A. | Sistema y procedimiento de transmision digital de datos punto a multipunto sobre red electrica. |
US6622044B2 (en) * | 2001-01-04 | 2003-09-16 | Cardiac Pacemakers Inc. | System and method for removing narrowband noise |
US7016493B2 (en) * | 2001-03-01 | 2006-03-21 | Asier Technology Corporation | Key matrix system |
US6917913B2 (en) * | 2001-03-12 | 2005-07-12 | Motorola, Inc. | Digital filter for sub-band synthesis |
US7675972B1 (en) * | 2001-07-30 | 2010-03-09 | Vixs Systems, Inc. | System and method for multiple channel video transcoding |
-
2001
- 2001-08-07 DE DE10138650A patent/DE10138650A1/de not_active Withdrawn
-
2002
- 2002-08-02 AT AT02751172T patent/ATE289461T1/de active
- 2002-08-02 DE DE50202283T patent/DE50202283D1/de not_active Expired - Lifetime
- 2002-08-02 US US10/486,304 patent/US8520843B2/en active Active
- 2002-08-02 WO PCT/EP2002/008661 patent/WO2003015328A2/fr active IP Right Grant
- 2002-08-02 EP EP02751172A patent/EP1388230B1/fr not_active Expired - Lifetime
-
2004
- 2004-03-12 HK HK04101815A patent/HK1059518A1/xx not_active IP Right Cessation
Non-Patent Citations (1)
Title |
---|
See references of WO03015328A2 * |
Also Published As
Publication number | Publication date |
---|---|
DE50202283D1 (de) | 2005-03-24 |
US8520843B2 (en) | 2013-08-27 |
WO2003015328A3 (fr) | 2003-11-27 |
HK1059518A1 (en) | 2004-07-02 |
DE10138650A1 (de) | 2003-02-27 |
EP1388230B1 (fr) | 2005-02-16 |
ATE289461T1 (de) | 2005-03-15 |
US20040196971A1 (en) | 2004-10-07 |
WO2003015328A2 (fr) | 2003-02-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE69823587T2 (de) | Angepasste zeichenkodierte Kompression zur Kodierung und Erzeugung von Wasserzeichen auf einem Medieninhalt | |
DE69534273T2 (de) | Verfahren und vorrichtung zum signalkodieren, signalubertragungsverfahren und verfahren und vorrichtung zur signaldekodierung | |
DE69312835T2 (de) | Aufzeichnungs- und Wiedergabegerät | |
DE69014422T2 (de) | Digitales Übertragungssystem, Sender und Empfänger zur Verwendung im Übertragungssystem und Aufzeichnungsträger, der aus dem Sender in Form einer Aufzeichnungseinrichtung erhalten wird. | |
DE69429499T2 (de) | Verfahren und vorrichtung zum kodieren oder dekodieren von signalen und aufzeichnungsmedium | |
DE10393776B4 (de) | Verfahren und Systeme zur Kodierung von mehreren Nachrichten in Audiodaten und zur Detektion derselben | |
EP0276753B1 (fr) | Méthode et appareil pour la transmission d'informations numériques et/ou l' enregistrement et la reproduction | |
DE69723959T2 (de) | Datenkompression und -dekompression durch rice-kodierer/-dekodierer | |
DE69932959T2 (de) | Verlustfreies Kodierungs- und Dekodierungsverfahren | |
EP2062254B1 (fr) | Stéganographie dans des codeurs de signaux numériques | |
EP1155526B1 (fr) | Dispositif et procede pour generer un flux de donnees audio et/ou video crypte | |
DE69427212T2 (de) | Modulare Audiodaten-Verarbeitungsarchitektur | |
DE69229649T2 (de) | IC-Karte mit eingebauter Sprachsynthetisierungfunktion | |
DE69331166T2 (de) | Übertragung von digitalen Breitbandsignalen | |
EP1604527A1 (fr) | Dispositif et procede pour incorporer une information utile dans un signal porteur | |
EP1388230B1 (fr) | Procede et dispositif destines au cryptage d'un signal discret, et procede et dispositif de decryptage | |
DE602004000884T2 (de) | Digitales Audiowasserzeichen | |
DE10036446A1 (de) | Vorrichtung zum Erzeugen einer Speicheradresse, Mobilstation, die diese Vorrichtung verwendet, und Verfahren zum Schreiben/Lesen von Daten | |
DE60104213T2 (de) | Teilverschlüsselung von zusammengesetzten bitströmen | |
EP0336510B1 (fr) | Codeur predictif d'image immobile | |
DE10229976B4 (de) | Verfahren zur Ver- und Entschlüsselung von nach dem Verfahren der priorisierten Pixelübertragung übertragenen oder gespeicherten digitalen Daten | |
DE19906512C2 (de) | Verfahren zum unbemerkten Übertragen und/oder Speichern von Zusatzinformationen innerhalb eines Signals, insbesondere Audiosignals | |
DE69028748T2 (de) | Verfahren und Einrichtung zur Verschlüsselung von Übertragungsdaten und zur Entschlüsselung verschlüsselter Daten und Computersystem, das eine solche Einrichtung enthält | |
DD295477A5 (de) | Verfahren und vorrichtung zur uebertragung von informationen mittels elektromagnetischer wellen | |
EP1530824B1 (fr) | Codage echelonnable d'information image, en particulier d'information image video |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20031128 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LI LU MC NL PT |
|
RBV | Designated contracting states (corrected) |
Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LI LU MC NL PT SE SK TR |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1059518 Country of ref document: HK |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
RBV | Designated contracting states (corrected) |
Designated state(s): AT CH DE FR GB LI |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT CH DE FR GB LI |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D Free format text: GERMAN |
|
REF | Corresponds to: |
Ref document number: 50202283 Country of ref document: DE Date of ref document: 20050324 Kind code of ref document: P |
|
GBT | Gb: translation of ep patent filed (gb section 77(6)(a)/1977) |
Effective date: 20050331 |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: GR Ref document number: 1059518 Country of ref document: HK |
|
ET | Fr: translation filed | ||
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed |
Effective date: 20051117 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 15 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 16 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 17 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: AT Payment date: 20210818 Year of fee payment: 20 Ref country code: FR Payment date: 20210823 Year of fee payment: 20 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20210824 Year of fee payment: 20 Ref country code: DE Payment date: 20210819 Year of fee payment: 20 Ref country code: CH Payment date: 20210824 Year of fee payment: 20 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R071 Ref document number: 50202283 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: PE20 Expiry date: 20220801 |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK07 Ref document number: 289461 Country of ref document: AT Kind code of ref document: T Effective date: 20220802 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF EXPIRATION OF PROTECTION Effective date: 20220801 |