EP1388230A2 - Procede et dispositif destines au cryptage d'un signal discret, et procede et dispositif de decryptage - Google Patents

Procede et dispositif destines au cryptage d'un signal discret, et procede et dispositif de decryptage

Info

Publication number
EP1388230A2
EP1388230A2 EP02751172A EP02751172A EP1388230A2 EP 1388230 A2 EP1388230 A2 EP 1388230A2 EP 02751172 A EP02751172 A EP 02751172A EP 02751172 A EP02751172 A EP 02751172A EP 1388230 A2 EP1388230 A2 EP 1388230A2
Authority
EP
European Patent Office
Prior art keywords
data blocks
successive
order
coded data
predetermined
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP02751172A
Other languages
German (de)
English (en)
Other versions
EP1388230B1 (fr
Inventor
Sascha Disch
Johannes Hilpert
Manfred Lutzky
Marc Gayer
Reinfried BARTHOLOMÄUS
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fraunhofer Gesellschaft zur Forderung der Angewandten Forschung eV
Original Assignee
Fraunhofer Gesellschaft zur Forderung der Angewandten Forschung eV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fraunhofer Gesellschaft zur Forderung der Angewandten Forschung eV filed Critical Fraunhofer Gesellschaft zur Forderung der Angewandten Forschung eV
Publication of EP1388230A2 publication Critical patent/EP1388230A2/fr
Application granted granted Critical
Publication of EP1388230B1 publication Critical patent/EP1388230B1/fr
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/06Secret communication by transmitting the information or elements thereof at unnatural speeds or in jumbled order or backwards

Definitions

  • the present invention relates to the encryption of discrete signals, e.g. on the encryption of voice information or the corresponding decryption.
  • the encrypted signals must not cause any damage when listening without decrypting the listening system.
  • the encrypted signals should therefore be encrypted in such a way that they do not produce any crackling, crackling or other extreme dynamic jumps when played without decryption. While it is often sufficient to encrypt the quality of the unauthorized reproduction when encrypting music data, ' with speech content it is particularly required that the reproduction quality of the encrypted data with unauthorized use does not make the speech information understandable, which can be interviews, reports, etc., for example allow more.
  • the object of the present invention is to provide a method and a device for encrypting a discrete signal as well as a method and a device for corresponding decryption, so that the encryption on the one hand is as secure as possible and on the other hand does not produce any errors in unauthorized processing and with previous encodings is tolerated.
  • the present invention is based on the knowledge that a very high level of security of the encryption can be achieved by introducing a temporal discontinuity, and that the occurrence of errors in the case of unauthorized processing of such encrypted signals can thereby be prevented and the compatibility with standard encodings can be ensured in that the change in the temporal order after coding the discrete signal, ie with respect to coded data blocks into which an encoder encodes the discrete signal, is carried out. In this way, on the one hand, it is prevented that a decoder, which receives the encrypted signal, does not get into undefined states, since during the encryption the temporal discontinuity is generated in units of coded data blocks.
  • the successive samples of a discrete signal are divided into successive time blocks, which are then encoded in coded data blocks with a predetermined order.
  • the predetermined sequence of the coded data blocks is then changed in accordance with a predetermined exchange rule.
  • the order of the coded data blocks of an encrypted signal which corresponds to a discrete signal, which consists of successive samples, in encrypted form, is changed according to a predetermined exchange rule or an inverse exchange rule, whereupon the encoded data blocks are changed Order are decoded into successive time blocks with a predetermined order.
  • the successive samples of the discrete signal are generated from the successive time blocks.
  • the change in the predetermined sequence of the encoded data blocks during encryption is achieved by permuting a predetermined number of successive data blocks of the encoded data blocks, a permutation vector being generated as a swapping rule for this purpose.
  • the permutation can be carried out with respect to successive groups of coded data blocks of the same size or length.
  • a different permutation vector can be generated and used for each permutation group.
  • the generation of the permutation vectors takes place in the decoding in a predetermined way, with a correct decryption there by ensuring that corresponding inverse permutation vectors are generated and used in the decryption for the back permutation of the groups of coded data blocks.
  • FIG. 1 shows a block diagram of an encryption device according to an exemplary embodiment of the present invention
  • FIG. 2 shows a block diagram of a decryption device according to an exemplary embodiment of the present invention
  • Fig. 3 is a schematic sketch showing an exemplary embodiment of encryption.
  • Fig. 4 is a schematic sketch showing an exemplary embodiment of a decryption.
  • 1 shows an encryption device according to an embodiment of the present invention, which converts a discrete time signal or an audio signal into coded data blocks in encrypted form.
  • 1 essentially comprises a psychoacoustic encoder 10 which receives the time signal and converts it into coded data blocks, and a device 12 for changing the order of the coded data blocks.
  • the psychoacoustic encoder 10 comprises a device 14 for dividing the successive discrete samples which make up the time signal into time blocks and a device 16 for coding the time blocks into coded data blocks.
  • the device 12 for changing the sequence comprises a device 18 for generating a permutation vector, a writing device 20, a first buffer 22, a second buffer 24 and a readout device 26.
  • An input of the writing device 20 is connected to an output of the psychoacoustic encoder 10 or Device 16 connected for coding, while two outputs of the same are each connected to an input of the first and second buffers 22 and 24.
  • An output of the device 18 for generating a permutation vector is connected to an input of the readout device 26 in order to output a permutation vector thereon, the readout device having two further inputs which are connected to the outputs of the intermediate memories 22 and 24.
  • the read-out device 26 is connected at an output to an output buffer 28 in order to output coded data blocks to it in encrypted form.
  • the time signal is a discrete audio signal that consists of successive samples.
  • the psychoacoustic encoder 10 is based, for example, on an encoding method of the AAC standard.
  • the device 14 divides the successive samples, for example, into time blocks with a number of successive samples which is equal to a power of 2. To handle aliasing effects, provision can be made for a division into mutually overlapping time blocks, so that each sample value has two time intervals. block is allocated, as is the case with AAC coding, for example.
  • the device 16 for coding the time blocks into coded data blocks receives the time blocks from the device 14 in chronological order and then carries out the coding thereof.
  • the coding of a time block can be carried out either individually or in isolation, time block by time block, or depending on previous and subsequent time blocks, in order, for example, to use psychoacoustic models, e.g. the temporal and spectral concealment to be taken into account.
  • the device 16 for encoding the time blocks outputs the encoded data blocks to the writing device 20 in a predetermined sequence which is dependent on the encoding method.
  • the data blocks can either all have the same length or different lengths, e.g. in the event that the data blocks have an MPEG2 / 4 AAC compliant structure.
  • the writer 20 receives the encoded data blocks and successively writes the encoded data blocks into a current one of the buffers 22 and 24, acting together as a removable buffer, as will be described below.
  • the size of the buffers 22 and 24 is sufficiently large to store N coded data blocks, where N is an integer greater than 1 (N> 1).
  • the writing device 20 writes the current one of the memories 22 and 24 in the order in which the coded data blocks are transmitted by the device 16 until there are N coded data blocks in the current one of the buffers 22 and 24.
  • the read-out device 26 reads out the buffer 22 and 24 just filled, while the write device 20 reads the other of the two buffers 22 and 24 with the coded data blocks from the Device 16 describes in the order of their receipt.
  • the read-out device 26 reads out the buffer memory 22 or 24, which was last completely described, in a different order than the same was described.
  • the read-out device 26 reads out the respective intermediate memory 22 or 24 in a permuted sequence, which is determined by a permutation vector of size N, which is generated and supplied by the device 18 for generating a permutation vector, as will be described below .
  • a permutation vector of size N which is generated and supplied by the device 18 for generating a permutation vector, as will be described below .
  • the coded data blocks read out in permuted order together form a permutation group of coded data blocks which the readout device 26 outputs to the output buffer 28, to which, for example, a computer interface (not shown) is connected.
  • the device 18 generates the permutation vector of size N, which defines the exchange rule, on the basis of which the coded data blocks of a permutation group are permuted, for each permutation group.
  • the generation of a permutation vector is based on N pseudo random numbers that are generated by the pseudo random number generator 30.
  • the pseudo-random number generator 30 generates N pseudo-random numbers in succession for the generation of each permutation vector of length N and outputs them to the sorter 34, the counter 32 incrementing a counter value when each pseudo-random number is output and outputting it to the reorderer 36, the counter 32 having a value starts from 0 to output a value of 1 for the first pseudorandom number.
  • the pseudo-random numbers that are output by the pseudo-random number generator 30 are numbered in parallel with the generation or provided with indices in the order in which they were generated.
  • the pseudo-random numbers generated by the pseudo-random number generator 30 together form a random number vector or a random number array of N pseudo-random numbers, while the numbers generated by the counter 32 form an index vector or an index array which consists of numbers from 1 to N.
  • the sorter 34 receives the random number vector and sorts it using a suitable sorting method, for example in increasing order.
  • the sorter 34 is coupled to the reorder 36 to allow the reorder 36 to reorder the index vector received from the counter 32 in parallel with the sorting of the random number vector.
  • the rearranged or permuted index array generated by the reorderer 36 represents the swapping rule for the N coded data blocks that are read next by the readout device and is output by the reorderer 36 as a permutation vector to the readout device 26, which is the same , as described above, used to define the readout order with respect to the corresponding buffer 22 or 24.
  • the write device 20 and the read-out device 26 change to the respective one other buffers 22 and 24, respectively, the reading process being carried out with respect to the new coded data blocks written in the change buffer, which are then output to the output buffer in permuted order.
  • the output buffer in permuted order.
  • a decryption device according to an exemplary embodiment of the present invention is explained below with reference to FIG. 2.
  • the decryption device of FIG. 2 is provided in order to transmit the encoded data blocks of the encryption device which are output in encrypted form. 1 again in a time signal, depending on the coding used in a lossy or lossless manner.
  • the device of FIG. 2 comprises a device 38 for changing the order of the received coded data blocks, which represent the encrypted signal, and a decoder 40, which is connected to the device 38 and decodes the coded data blocks.
  • the device 38 has an arrangement similar to the device 12 of the encryption device of FIG. 1, and consists of a writing device 42, a buffer 1 44, a buffer 2 46, a read-out device 48 and a device 50 for generating an inverse permutation vector 1, which has a structure similar to the device 18 of the encryption device of FIG. 1 and is therefore not shown in more detail in FIG. 2 for reasons of clarity.
  • the writing device 42 receives the coded data blocks, which are present in the encrypted form, at an input and is connected to an input of the buffer memory 44 or of the buffer memory 46 at two outputs.
  • the readout device comprises three inputs, one of which is connected to an output of the device 50 for generating an inverse permutation vector and the other two are each connected to an output of the buffer memory 44 and 46, respectively.
  • An output of the readout device 48 is connected to the decoder 40 to transmit the decoded data blocks in a predetermined order, i.e. in the order intended for decoding according to the respective coding method.
  • the decoder 40 comprises a device 52 for decoding the coded data blocks which are output by the read-out device 48, and a device 54 following the device 52 for forming the successive samples, the device 54 receiving the time signal. outputs for example to a digital / analog converter (not shown) or the like.
  • the writer 42 receives the encoded data blocks, which are in encrypted form, and outputs them in the order in which they are transmitted to a current one of the buffers 44 and 46 which, like the encryption device of Fig. 1, cooperate as a removable buffer. While the writing device 42 fills one of the two buffers 44 and 46 in succession with N coded data blocks, the reading device 48 reads out the other buffer. While one buffer is being filled with the coded data blocks in the transmission order, the reading of the other buffer is carried out in permuted order, which depends on the inverse permutation vector generated by the device 50.
  • An inverse permutation vector means here that the interchanging rule generated by the inverse permutation vector reverses the interchanges that were made by the decryption device of FIG. 1 on a respective interchanging or permutation group of N-coded data blocks.
  • the device 50 generates the inverse permutation vectors per readout, for example using the same arrangement of devices as is shown for the device 18 in FIG. 1, the device 50, however, from the permutation vector as generated by the device 18 by a suitable device generates an inverse permutation vector, for example by applying the interchange rule defined by the permutation vector to a vector as it is output by the counter (see 32 in FIG. 1), ie a vector of ordered numbers from 1 to N.
  • the N coded data blocks read out in a permuted order by the read-out device 48 are fed to the device 52 for decoding the coded data blocks, the same now being present in the predetermined order which is necessary for decoding the coded data blocks in accordance with the coding method on which the decoder 44 is based to get the correct time signal.
  • the read-out device 48 After the read-out device 48 has read out the respective intermediate store or the write device 42 has completely filled the other intermediate store, the read-out device reads out the intermediate store which has just been filled by the write device 42, while the write device 42 describes the intermediate store which has been read out by the read-out device 48 ,
  • the device 52 decodes the encoded data blocks and outputs time blocks in a predetermined order.
  • the device 54 receives the time blocks and uses them to form the successive samples from which the time signal is made, and outputs them, for example, to an analog / digital converter (not shown).
  • FIGS. 3 and 4 After exemplary embodiments for an encryption or decryption device have been described in the foregoing, an explicit embodiment is described below with reference to FIGS. 3 and 4, in which a discrete signal is encrypted by the device of FIG. 1 into an encrypted signal and the latter is decrypted by the device of FIG. 2, with additional reference being made to FIGS. 1 and 2.
  • each sample can be located in one or more of the time blocks 66, or the time blocks can overlap one another in order to eliminate aliasing artifacts.
  • each encoded data block 70 can have an individually different length or size, as illustrated by the different sizes of the blocks.
  • a state is shown at 72 as it arises for the successive coded data blocks 70 during the encryption in the encryption device of FIG. 1.
  • state 72 as in the following states in FIG. 3, in particular the contents of the buffer store 1 (22 in FIG. 1), the buffer store 2 (24 in FIG. 1) and the output buffer (28 in FIG. 1 ) for the respective state.
  • the state is shown for the exemplary case that the exchange group size is set to 5 during encryption or decryption.
  • the state shown at 72 corresponds to the state as it arises in the device of FIG. 1 after the first five A-Es have been written by the data blocks 70 at 68 into the active or current buffer, in this case buffer 1 have been.
  • the values in the buffer 2 and the output buffer may depend on previous coded data blocks, and are therefore shown with dashes. As can be seen, the coded data blocks A-E have been stored in the buffer 1 in their predetermined sequence.
  • the state is shown as it results after five further coded data blocks.
  • the 5 further coded data blocks F - J have been written into the buffer 2, while the coded data blocks stored in the buffer 1 have been read out into the output buffer.
  • the permutation vector, as indicated at 76, has been used for reading out the coded data blocks stored in the buffer 1. (4,3,5,2,1).
  • the permutation vector 76 assigns each coded data block in the buffer 1 a number between 1 to 5 or N which indicates the readout order or the position at which this coded data block is to be written into the output buffer, so that in the Output buffer the encoded data blocks AE are in the order EDBAC.
  • the state is shown after a further 5 coded data blocks.
  • the 5 subsequent coded data blocks K-0 have in turn been written into the buffer 1, while in the meantime the buffer 2 has been read out into the output buffer by means of a permutation vector 80 (5,1,3,2,4) is where the encoded data blocks result in the order GIHJF.
  • the stream or the sequence of coded data blocks is shown in encrypted form, as they are input into or output from the output buffer 28.
  • the coded data blocks are scrambled compared to the predetermined order in which they are usually output by the coding on which the encoder 10 is based, which is why in the event that the audio data carries speech information this speech information is incomprehensible when decoded without decryption according to the present invention. Nevertheless, decoding without decryption prevents the decoder from entering invalid states, since the temporal discontinuity is defined in units of encoded data blocks.
  • IMDCT inverse modified discrete cosine transform
  • the signal 82 is received by a decoder or a decryption device according to FIG. with a corresponding inverse exchange of the input data, decrypted, then the data blocks or the data frames are again in the correct order in the buffer and the subsequent decoding can be carried out in accordance with the standard.
  • This decryption process is explained in more detail with reference to FIG. 4 for the explicit embodiment of FIG. 3.
  • FIG. 4 shows at 84 an example of a sequence of coded data blocks in encrypted form, which in this case corresponds to that of FIG. 3 at 82.
  • Shown at 86 is a state that occurs in the decryption device of FIG. 2 after it has received the first five of the encoded data blocks of 84.
  • the content of the buffer store 1 (44 in FIG. 2)
  • the content of the buffer store 2 (46 in FIG. 2)
  • the sequence of coded ones Blocks of data output from device 38 to encoder 40 are shown.
  • the decoded data blocks are placed in the current buffer, in this case buffer 1, in the order in which they are transmitted.
  • the state is shown at 88 as it arises after five further coded data blocks FGHIJ.
  • the next five coded data blocks have been written into the buffer 2, while by means of an inverse permutation vector 90 the coded data blocks EDBAC are read out from the buffer 1 in order to be transmitted to the decoder 40 in the order ABCDE, whereby the inverse permutation vector results from the permutation vector 76 of FIG. 3, which related to the same permutation group, by applying the latter as a swapping rule to a vector (1,2,3,4,5).
  • the state is shown at 92 as it results from the stream of coded data blocks 84 after reading out a further five coded data blocks.
  • the buffer 1 has again been filled with the following coded data blocks K - 0, while the coded data blocks GHIJF in the buffer 2 have been read out to the decoder and output in a permuted sequence or inversely permuted sequence FGHIJ.
  • the back permutation is based on the inverse permutation vector 94, which results from the permutation vector 80 of FIG. 3 by applying the latter to a vector (1,2,3,4,5).
  • the stream of successive encoded data blocks is shown as it is fed to the decoder.
  • the order in which the encoded data blocks have been output by the encoder of the encryption device is restored, ie ABCDEFGHIJKLMN ..., so that the decoding can be carried out in accordance with the standards.
  • the description provided above with reference to FIGS. 1 to 4 related to encryption which is based on the exchange of data blocks of the time signal within a block group or exchange group.
  • the block swapping in the time domain destroys the temporal modulation of a speech signal in such a way that intelligibility is considerably reduced in the case of a speech signal.
  • An advantage of the above exemplary embodiments is that although a psychoacoustic compression method is used in the preceding exemplary embodiments to encode the time signal, the assumptions on which this psychoacoustic compression method is based, such as, for example, about the temporal and spectral concealment, remain valid since the temporal discontinuity is only is generated after compression, ie the chronological order of the already encoded data frames is exchanged.
  • the exemplary embodiments described above can basically be used for all encoded data streams which are based on a sequential sequence of data frames which are self-contained and overlap after coding.
  • the speech incomprehensibility of the encrypted signal can be improved in that the psychoacoustic encoder 10 or a device between the same and the device for changing the order a frequency range scrambling according to the in the Introduction to the mentioned patent application W099 / 51279.
  • the present invention both in hardware, such as, for example, as an ASIC, an integrated circuit or the like, and in software, such as, for example, as a PC Software that can be implemented.
  • the present invention has been applied to the encryption of audio ten or voice signals has been described, the present invention is generally applicable to all areas in which discrete signals are used and where appropriate coding thereof takes place, such as in image and video processing or data transmission in general.
  • the coding preceding the generation of the temporal discontinuity in the encryption is not limited to a psychoacoustic coding.
  • JPEG encoding is also possible for image or video data.
  • the present invention can be implemented with all coding methods that subdivide successive discrete samples into time blocks and code them into coded data blocks or frames or directly code existing time blocks.
  • the exact implementation of the device for generating a permutation vector can also be implemented differently, such as e.g. especially with regard to the length of the exchange group N or the number and size of the buffers used.
  • the device for generating a permutation vector can be implemented differently than described above.
  • the permutation vector could be the same for all exchange groups, in which case the inverse permutation vector would also be fixed.
  • the principle of permuting successive exchange groups used in the previous exemplary embodiments can be deviated from, and that the order change can also be carried out in other ways, such as e.g. by changing the order with respect to the entire coded data blocks, in which case it would be necessary to temporarily store all the coded data blocks before changing the order in the encryption and to store the entire coded data blocks before changing the order in the decryption.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Compression, Expansion, Code Conversion, And Decoders (AREA)
  • Storage Device Security (AREA)
  • Communication Control (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)
  • Facsimile Transmission Control (AREA)
EP02751172A 2001-08-07 2002-08-02 Procede et dispositif destines au cryptage d'un signal discret, et procede et dispositif de decryptage Expired - Lifetime EP1388230B1 (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE10138650A DE10138650A1 (de) 2001-08-07 2001-08-07 Verfahren und Vorrichtung zum Verschlüsseln eines diskreten Signals sowie Verfahren und Vorrichtung zur Entschlüsselung
DE10138650 2001-08-07
PCT/EP2002/008661 WO2003015328A2 (fr) 2001-08-07 2002-08-02 Procede et dispositif destines au cryptage d'un signal discret, et procede et dispositif de decryptage

Publications (2)

Publication Number Publication Date
EP1388230A2 true EP1388230A2 (fr) 2004-02-11
EP1388230B1 EP1388230B1 (fr) 2005-02-16

Family

ID=7694608

Family Applications (1)

Application Number Title Priority Date Filing Date
EP02751172A Expired - Lifetime EP1388230B1 (fr) 2001-08-07 2002-08-02 Procede et dispositif destines au cryptage d'un signal discret, et procede et dispositif de decryptage

Country Status (6)

Country Link
US (1) US8520843B2 (fr)
EP (1) EP1388230B1 (fr)
AT (1) ATE289461T1 (fr)
DE (2) DE10138650A1 (fr)
HK (1) HK1059518A1 (fr)
WO (1) WO2003015328A2 (fr)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7933405B2 (en) * 2005-04-08 2011-04-26 Icera Inc. Data access and permute unit
US7450040B2 (en) * 2006-03-20 2008-11-11 Marvell International Ltd. Method and apparatus for generating non-binary balanced codes
ITRM20070010A1 (it) * 2007-01-09 2008-07-10 Telecomponenti S R L Metodo di elaborazione di un segnale digitale e sistema utilizzante tale metodo.
US8700406B2 (en) * 2011-05-23 2014-04-15 Qualcomm Incorporated Preserving audio data collection privacy in mobile devices
US11036561B2 (en) * 2018-07-24 2021-06-15 Oracle International Corporation Detecting device utilization imbalances

Family Cites Families (57)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CH518658A (de) * 1970-07-07 1972-01-31 Patelhold Patentverwaltungs Un Verfahren zur verschlüsselten Nachrichtenübermittlung durch zeitliche Vertauschung von Informationselementen
CH558993A (de) 1973-03-19 1975-02-14 Patelhold Patentverwertung Verfahren und einrichtung zur verschluesselten nachrichtenuebertragung.
CH559483A5 (fr) * 1973-06-12 1975-02-28 Patelhold Patentverwertung
US4232194A (en) * 1979-03-16 1980-11-04 Ocean Technology, Inc. Voice encryption system
US4278840A (en) * 1979-03-23 1981-07-14 Datotek, Inc. Dynamic frequency and time voice encryption system and method
US4443660A (en) * 1980-02-04 1984-04-17 Rockwell International Corporation System and method for encrypting a voice signal
US4393276A (en) * 1981-03-19 1983-07-12 Bell Telephone Laboratories, Incorporated Fourier masking analog signal secure communication system
JPS59111441A (ja) * 1982-12-17 1984-06-27 Sony Corp 音声信号の秘話方式
US4612414A (en) * 1983-08-31 1986-09-16 At&T Information Systems Inc. Secure voice transmission
JPS6216639A (ja) * 1985-07-16 1987-01-24 Kokusai Denshin Denwa Co Ltd <Kdd> 秘話音声信号送出装置
GB2182229B (en) * 1985-10-25 1989-10-04 Racal Res Ltd Speech scramblers
US5095525A (en) * 1989-06-26 1992-03-10 Rockwell International Corporation Memory transformation apparatus and method
US5339108A (en) * 1992-04-09 1994-08-16 Ampex Corporation Ordering and formatting coded image data and reconstructing partial images from the data
US5436940A (en) * 1992-06-11 1995-07-25 Massachusetts Institute Of Technology Quadrature mirror filter banks and method
US5303302A (en) * 1992-06-18 1994-04-12 Digital Equipment Corporation Network packet receiver with buffer logic for reassembling interleaved data packets
JPH0730855A (ja) * 1993-07-08 1995-01-31 Sony Corp ビデオデータの記録方法
NZ277128A (en) * 1993-12-01 1998-04-27 William Michael Raike Public key encryption system and mixture generator
DE69532227T2 (de) * 1994-07-15 2004-09-30 Ntt Mobile Communications Network Inc. Signalsendeverfahren und kommunikationssystem
US5717819A (en) * 1995-04-28 1998-02-10 Motorola, Inc. Methods and apparatus for encoding/decoding speech signals at low bit rates
US5991308A (en) * 1995-08-25 1999-11-23 Terayon Communication Systems, Inc. Lower overhead method for data transmission using ATM and SCDMA over hybrid fiber coax cable plant
JP3823275B2 (ja) * 1996-06-10 2006-09-20 富士通株式会社 動画像符号化装置
US6337879B1 (en) * 1996-08-14 2002-01-08 Sony Corporation Video data compression apparatus and method of same
US6134631A (en) * 1996-08-19 2000-10-17 Hyundai Electronics America, Inc. Non-volatile memory with embedded programmable controller
JP3496411B2 (ja) * 1996-10-30 2004-02-09 ソニー株式会社 情報符号化方法及び復号化装置
US6307940B1 (en) * 1997-06-25 2001-10-23 Canon Kabushiki Kaisha Communication network for encrypting/deciphering communication text while updating encryption key, a communication terminal thereof, and a communication method thereof
US20020002675A1 (en) * 1997-08-06 2002-01-03 Ronald Roscoe Bush Secure encryption of data packets for transmission over unsecured networks
US6356545B1 (en) * 1997-08-08 2002-03-12 Clarent Corporation Internet telephone system with dynamically varying codec
US6507672B1 (en) * 1997-09-10 2003-01-14 Lsi Logic Corporation Video encoder for digital video displays
FR2771581B1 (fr) * 1997-11-26 1999-12-17 Thomson Multimedia Sa Procede d'embrouillage et procede de desembrouillage de donnees video numeriques et dispositifs mettant en oeuvre les procedes
JP3722969B2 (ja) * 1998-01-08 2005-11-30 株式会社東芝 再送制御方法及び再送制御装置
US7430257B1 (en) * 1998-02-12 2008-09-30 Lot 41 Acquisition Foundation, Llc Multicarrier sub-layer for direct sequence channel and multiple-access coding
US6650659B1 (en) * 1998-02-27 2003-11-18 Sony Corporation Data transmitting method
US6301268B1 (en) * 1998-03-10 2001-10-09 Lucent Technologies Inc. Communication method for frequency division multiplexing signalling systems with reduced average power requirements
AUPP276098A0 (en) 1998-04-01 1998-04-30 Nokuta Pty Ltd A method for treating gelatine
US6163576A (en) * 1998-04-13 2000-12-19 Lsi Logic Corporation Video encoder having reduced memory bandwidth requirements
CA2333095C (fr) * 1998-06-03 2005-05-10 Cryptography Research, Inc. Perfectionnement de normes cryptographiques et autres procedes cryptographiques a reduction des fuites pour cartes a puces et autres systemes cryptographiques
JP2000057695A (ja) * 1998-08-13 2000-02-25 Sony Corp 情報記録再生装置および方法、並びに提供媒体
JP3748717B2 (ja) * 1998-08-31 2006-02-22 シャープ株式会社 動画像符号化装置
US6985722B1 (en) * 1998-09-25 2006-01-10 Soma Networks, Inc. Telecommunication services
CA2347011A1 (fr) * 1998-10-28 2000-05-04 Ellwood Mcgrogan Appareil et procedes de synchronisation cryptographique dans des communications par paquets
JP2000138897A (ja) * 1998-10-30 2000-05-16 Sony Corp データ処理装置およびデータ記録装置
US6445797B1 (en) * 1998-12-16 2002-09-03 Secure Choice Llc Method and system for performing secure electronic digital streaming
EP1021048A3 (fr) * 1999-01-14 2002-10-02 Kabushiki Kaisha Toshiba Système d'enregistrement vidéo numérique et son moyen d'enregistrement
US6226608B1 (en) * 1999-01-28 2001-05-01 Dolby Laboratories Licensing Corporation Data framing for adaptive-block-length coding system
DE19907964C1 (de) * 1999-02-24 2000-08-10 Fraunhofer Ges Forschung Vorrichtung und Verfahren zum Erzeugen eines verschlüsselten Datenstroms und Vorrichtung und Verfahren zum Erzeugen eines entschlüsselten Audio- und/oder Videosignals
FI116992B (fi) * 1999-07-05 2006-04-28 Nokia Corp Menetelmät, järjestelmä ja laitteet audiosignaalin koodauksen ja siirron tehostamiseksi
FI116643B (fi) * 1999-11-15 2006-01-13 Nokia Corp Kohinan vaimennus
US6642885B2 (en) * 1999-12-10 2003-11-04 Nokia Corporation Receiver for a satellite based position location system
GB2358098A (en) * 2000-01-06 2001-07-11 Sharp Kk Method of segmenting a pixelled image
US20020009000A1 (en) * 2000-01-18 2002-01-24 Qdesign Usa, Inc. Adding imperceptible noise to audio and other types of signals to cause significant degradation when compressed and decompressed
US7047196B2 (en) * 2000-06-08 2006-05-16 Agiletv Corporation System and method of voice recognition near a wireline node of a network supporting cable television and/or video delivery
US20020076049A1 (en) * 2000-12-19 2002-06-20 Boykin Patrick Oscar Method for distributing perceptually encrypted videos and decypting them
ES2184587B1 (es) * 2000-12-18 2004-08-01 Diseño De Sistemas En Silicio, S.A. Sistema y procedimiento de transmision digital de datos punto a multipunto sobre red electrica.
US6622044B2 (en) * 2001-01-04 2003-09-16 Cardiac Pacemakers Inc. System and method for removing narrowband noise
US7016493B2 (en) * 2001-03-01 2006-03-21 Asier Technology Corporation Key matrix system
US6917913B2 (en) * 2001-03-12 2005-07-12 Motorola, Inc. Digital filter for sub-band synthesis
US7675972B1 (en) * 2001-07-30 2010-03-09 Vixs Systems, Inc. System and method for multiple channel video transcoding

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO03015328A2 *

Also Published As

Publication number Publication date
DE50202283D1 (de) 2005-03-24
US8520843B2 (en) 2013-08-27
WO2003015328A3 (fr) 2003-11-27
HK1059518A1 (en) 2004-07-02
DE10138650A1 (de) 2003-02-27
EP1388230B1 (fr) 2005-02-16
ATE289461T1 (de) 2005-03-15
US20040196971A1 (en) 2004-10-07
WO2003015328A2 (fr) 2003-02-20

Similar Documents

Publication Publication Date Title
DE69823587T2 (de) Angepasste zeichenkodierte Kompression zur Kodierung und Erzeugung von Wasserzeichen auf einem Medieninhalt
DE69534273T2 (de) Verfahren und vorrichtung zum signalkodieren, signalubertragungsverfahren und verfahren und vorrichtung zur signaldekodierung
DE69312835T2 (de) Aufzeichnungs- und Wiedergabegerät
DE69014422T2 (de) Digitales Übertragungssystem, Sender und Empfänger zur Verwendung im Übertragungssystem und Aufzeichnungsträger, der aus dem Sender in Form einer Aufzeichnungseinrichtung erhalten wird.
DE69429499T2 (de) Verfahren und vorrichtung zum kodieren oder dekodieren von signalen und aufzeichnungsmedium
DE10393776B4 (de) Verfahren und Systeme zur Kodierung von mehreren Nachrichten in Audiodaten und zur Detektion derselben
EP0276753B1 (fr) Méthode et appareil pour la transmission d&#39;informations numériques et/ou l&#39; enregistrement et la reproduction
DE69723959T2 (de) Datenkompression und -dekompression durch rice-kodierer/-dekodierer
DE69932959T2 (de) Verlustfreies Kodierungs- und Dekodierungsverfahren
EP2062254B1 (fr) Stéganographie dans des codeurs de signaux numériques
EP1155526B1 (fr) Dispositif et procede pour generer un flux de donnees audio et/ou video crypte
DE69427212T2 (de) Modulare Audiodaten-Verarbeitungsarchitektur
DE69229649T2 (de) IC-Karte mit eingebauter Sprachsynthetisierungfunktion
DE69331166T2 (de) Übertragung von digitalen Breitbandsignalen
EP1604527A1 (fr) Dispositif et procede pour incorporer une information utile dans un signal porteur
EP1388230B1 (fr) Procede et dispositif destines au cryptage d&#39;un signal discret, et procede et dispositif de decryptage
DE602004000884T2 (de) Digitales Audiowasserzeichen
DE10036446A1 (de) Vorrichtung zum Erzeugen einer Speicheradresse, Mobilstation, die diese Vorrichtung verwendet, und Verfahren zum Schreiben/Lesen von Daten
DE60104213T2 (de) Teilverschlüsselung von zusammengesetzten bitströmen
EP0336510B1 (fr) Codeur predictif d&#39;image immobile
DE10229976B4 (de) Verfahren zur Ver- und Entschlüsselung von nach dem Verfahren der priorisierten Pixelübertragung übertragenen oder gespeicherten digitalen Daten
DE19906512C2 (de) Verfahren zum unbemerkten Übertragen und/oder Speichern von Zusatzinformationen innerhalb eines Signals, insbesondere Audiosignals
DE69028748T2 (de) Verfahren und Einrichtung zur Verschlüsselung von Übertragungsdaten und zur Entschlüsselung verschlüsselter Daten und Computersystem, das eine solche Einrichtung enthält
DD295477A5 (de) Verfahren und vorrichtung zur uebertragung von informationen mittels elektromagnetischer wellen
EP1530824B1 (fr) Codage echelonnable d&#39;information image, en particulier d&#39;information image video

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20031128

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LI LU MC NL PT

RBV Designated contracting states (corrected)

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LI LU MC NL PT SE SK TR

REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1059518

Country of ref document: HK

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

RBV Designated contracting states (corrected)

Designated state(s): AT CH DE FR GB LI

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT CH DE FR GB LI

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: GERMAN

REF Corresponds to:

Ref document number: 50202283

Country of ref document: DE

Date of ref document: 20050324

Kind code of ref document: P

GBT Gb: translation of ep patent filed (gb section 77(6)(a)/1977)

Effective date: 20050331

REG Reference to a national code

Ref country code: HK

Ref legal event code: GR

Ref document number: 1059518

Country of ref document: HK

ET Fr: translation filed
PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed

Effective date: 20051117

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 15

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 16

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 17

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: AT

Payment date: 20210818

Year of fee payment: 20

Ref country code: FR

Payment date: 20210823

Year of fee payment: 20

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20210824

Year of fee payment: 20

Ref country code: DE

Payment date: 20210819

Year of fee payment: 20

Ref country code: CH

Payment date: 20210824

Year of fee payment: 20

REG Reference to a national code

Ref country code: DE

Ref legal event code: R071

Ref document number: 50202283

Country of ref document: DE

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

REG Reference to a national code

Ref country code: GB

Ref legal event code: PE20

Expiry date: 20220801

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK07

Ref document number: 289461

Country of ref document: AT

Kind code of ref document: T

Effective date: 20220802

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF EXPIRATION OF PROTECTION

Effective date: 20220801