TW452732B - Methods of digital steganography for multimedia data - Google Patents

Methods of digital steganography for multimedia data Download PDF

Info

Publication number
TW452732B
TW452732B TW088119232A TW88119232A TW452732B TW 452732 B TW452732 B TW 452732B TW 088119232 A TW088119232 A TW 088119232A TW 88119232 A TW88119232 A TW 88119232A TW 452732 B TW452732 B TW 452732B
Authority
TW
Taiwan
Prior art keywords
data
patent application
scope
item
data element
Prior art date
Application number
TW088119232A
Other languages
Chinese (zh)
Inventor
Anthony Tung Shuen Ho
Siu Chung Tam
Siong Chai Tan
Lian Teck Yap
Original Assignee
Datamark Technologies Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from PCT/SG1999/000105 external-priority patent/WO2000025203A1/en
Application filed by Datamark Technologies Pte Ltd filed Critical Datamark Technologies Pte Ltd
Application granted granted Critical
Publication of TW452732B publication Critical patent/TW452732B/en

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

A lossless steganographic encoding method for secure transmission or storage of multimedia data. Primary data, such as text, image, video, audio or other digital data, is utilised in a steganographic process to encode secondary data, such as text, image, video, audio or other digital data. The primary data includes a plurality of first data elements and the secondary data includes a plurality of second data elements. For each second data element an operation is performed with a first data element so as to generate a key element as a result of the operation. The key elements may then be securely transmitted and/or stored. In preferred embodiments of the method, the primary data may be rearranged according to a predefined or random manner, or it may be resized so as to match the size of the secondary data. A complementary decoding method is disclosed, and a method generating a pseudo-random number sequence, which may be used in the steganographic encoding and decoding methods, is also disclosed.

Description

452732 五、發明說明d) 發明領i 本發明係 位資料隱藏 補解碼方法 的方法有關 (steganogr 此編碼方 影像或視訊 此範例應用 應用與使用 列的方法可 發明背景 關於普遍地用於安全傳輸或資訊儲存的編碼數 編碼(steganographic)方法。本發明也與其互 及產生一用於任何數位檔案之擬隨機數字序列 。此擬隨機數字序列可以用於隱藏編碼 a p h i c )或解碼方法。 法特別適合用於機密資訊如文字,音訊,還有 資料的數位偽裝或隱藏,而這將方便描述關於 的方法。然而,此編碼方法想要用於更寬廣的 是會被察知的。相同地,產生一擬隨機數字序 能用於除了隱藏方法應用之外的應用。 經由網際網路與數位資料儲存媒體(DSM)提供之多媒體 產品與服務的驚人成長已經導致版權鑑定與保護資料完整 的需求。在過去幾年’ 一些數位浮水印技術已經發展用於 解決關於網際網路與DSM版權資訊的合法使用問題。 、 —些數位浮水印技術最近已經取得專利。這些例子包含 1997年頒予Rhoads的美國專利第5, 636, 292號與1997年頒 予Stanford及Handel的美國專利第5,6 5 9,7 2 6號。 R h 〇 a d s揭露一種壓印識別碼於載波的方法,此載波如一電 子資料信號或物質媒介,在某種程度上允許識別碼較晚識 別而載波因此確定。Stanford與Handel揭露一種把附屬資 訊嵌入主資料如照片,電視信號,傳真傳輸,或識別卡的 方法。此方法依照附屬資訊運用主資料的雜訊成分來運452732 V. Description of the invention d) Inventive method i The present invention relates to the method of hidden data supplementary decoding method (steganogr This encoder image or video This example application application and method of using the column can be invented Background about the general use for secure transmission or Steganographic method for information storage. The present invention also interacts with it to generate a quasi-random number sequence for any digital file. This quasi-random number sequence can be used for hidden coding aphic or decoding methods. The method is particularly suitable for digitally disguising or hiding confidential information such as text, audio, and data, which will facilitate the description of the method. However, it is known that this encoding method is intended to be used more broadly. Similarly, generating a quasi-random number sequence can be used for applications other than the hidden method application. The phenomenal growth of multimedia products and services provided via the Internet and Digital Data Storage Media (DSM) has led to the need for copyright identification and integrity of data protection. Over the past few years, some digital watermarking technologies have been developed to address the legal use of copyright information on the Internet and DSM. Some digital watermarking technologies have recently been patented. These examples include US Patent No. 5,636,292 issued to Rhoads in 1997 and US Patent No. 5,6 5 9,7 2 6 issued to Stanford and Handel in 1997. Rh o a d s discloses a method of embossing an identification code on a carrier wave, such as an electronic data signal or a physical medium, to a certain extent allowing the identification code to be identified later and the carrier wave determined accordingly. Stanford and Handel disclose a way to embed subsidiary information into master data such as photos, television signals, fax transmissions, or identification cards. This method uses the noise component of the master data to operate according to the subsidiary information.

452 73 2 五、發明說明¢2) 作。 許多先前技巧數位浮水印技術,包含前述揭露於美國專 利的技術,只能夠隱藏有限的資訊如少數的邏輯位元(即 π 1 與"Ο M )或少數的字母(如” A1 2")於主資料中。然而,對 於版權存在於主產品如新加坡衛星影像去紀錄詳細的所有. 權資訊,整個信息或句子可能需要隱藏或聯繫於主資料。 例如,關於主產品的所有權,句子”新加坡數位影像為譚 ' 約翰先生所有,註明日期於1 9 9 7年1 2月1 6日π可以比必須 依靠只是簡單的密碼來確定版權侵害提供更多確實的證 明。 因此這裡仍然需要一隱藏編碼(s t e g a η 〇 g r a p h i c )方法, 其可以允許在沒有降低主要資料量的情況下使用主要資料 (如文字,影像,音訊或視訊資料)編碼一相當長的次要資 料串(如文字'影像*音訊或視訊資料)。 除上述提及在網際網路的應用之外,許多潛在的消費 者,商業與服務的應用可以因使用數位隱藏 (steganography)技術而受惠,包含用於版權保護與簽名 鑑定的目的與用於資訊安全傳輸。這些應用包括保證文 字,影像,音訊或視訊資料的隱藏編碼 (s t e g a η 〇 g r a p h i c ),其包含相關於數位靜態攝影照片或視 訊攝影機的所有權鑑定或特性資訊,在音樂工業中流行音 樂唱片的版權保護與版稅追蹤。商業與服務部分可能得益 於機密資訊的安全傳輸與接收以及相關可以編碼於經由開 放通道傳輸之正常資料串的機密文件與電子交易之數位簽452 73 2 V. Description of invention ¢ 2). Many previous techniques of digital watermarking, including the aforementioned technology disclosed in the US patent, can only hide limited information such as a small number of logical bits (ie, π 1 and " OM) or a few letters (such as "A1 2") In the master data. However, for copyrights that exist in the master product such as Singapore satellite imagery to record all the details. Right information, the entire information or sentence may need to be hidden or linked to the master data. For example, regarding the ownership of the master product, the sentence "Singapore" The digital image is owned by Mr. Tan 'John, dated on February 16, 1997, π can provide more conclusive proof than having to rely on a simple password to determine copyright infringement. Therefore, there is still a need for a hidden encoding (stega η 〇graphic) method, which can allow the use of primary data (such as text, video, audio or video data) to encode a relatively long secondary data string without reducing the amount of primary data. (Such as text 'image * audio or video data). In addition to the Internet applications mentioned above, many potential consumers, business and service applications can benefit from the use of digital steganography, including for copyright protection and signature verification purposes and for Information security transmission. These applications include guaranteeing the hidden encoding of text, video, audio or video data (stega η 〇graphic), which contains the ownership identification or characteristic information related to digital still photography photos or video cameras, and the copyright protection of popular music records in the music industry With royalty tracking. The business and services sector may benefit from the secure transmission and reception of confidential information and related confidential documents and digital signatures of electronic transactions that can be encoded in normal data strings transmitted via open channels.

/-N 〇 ^ 五、發明說明(3) 名。 擬隨機數字產生器為當種子相同時給定一固定隨機數字 序列的演算法或裝置。此種子可能為數字,位元串,數位 檔案或任何其他資料形式。 典型的隨機數字產生器使用混亂函數,例如SH A (安全混. 亂演算法),於授予微軟股份有限公司(M i c r 〇 s 〇 f t 匚〇^〇『31:1〇11)(1998)的美國專利(118?&七6111;)第5,787,179' 號與授予石夕谷製圖公司(Silicon Graphics Inc. )(1998) 的美國專利(US Patent)第5, 732, 138號。 發明摘要 在一方面,本發明提供一產生擬隨機數字序列的方法, 其包括下列步驟: 提供包括已排列資料元素的來源資料,每個資料元素的 内容由一數字群組表示; 將數字群組讀入一陣列中使得陣列的每個位置包含該數 字其中之一; 在數字陣列内選擇一起始位置;以及 重新組合該數字以構成關於起始位置的新數字群組,使 得每個新數字群組代表一擬隨機數字而連續的新數字群組 代表該擬隨機數字序列。 在一實施例中,來源資料的資料元素以二元標記法表示 而每個資料元素的内容更好地以一位元組(即8個位元)表 示。在此實施例中,每8位元位元組的每個位元組成一數 字,其可能讀入一位元陣列使得陣列的每個位置包含一位/ -N 〇 ^ V. Description of the invention (3). A pseudo-random number generator is an algorithm or device that gives a fixed random number sequence when the seeds are the same. This seed may be a number, a bit string, a digital file, or any other form of data. Typical random number generators use chaotic functions, such as SH A (Secure Hybrid. Chaotic Algorithm), which was awarded to Microsoft Corporation (Micr 〇s 〇ft 〇〇 ^ 〇 『31: 1〇11) (1998) U.S. Patent (118 & VII 6111;) No. 5,787,179 'and U.S. Patent No. 5,732,138 issued to Silicon Graphics Inc. (1998). SUMMARY OF THE INVENTION In one aspect, the present invention provides a method for generating a quasi-random number sequence, which includes the following steps: Provide source data including arranged data elements, and the content of each data element is represented by a number group; Read into an array such that each position of the array contains one of the numbers; select a starting position within the number array; and recombine the number to form a new group of numbers about the starting position such that each new group of numbers A group represents a quasi-random number and a continuous new group of numbers represents the quasi-random number sequence. In one embodiment, the data elements of the source data are represented by a binary notation, and the content of each data element is better represented by a single byte (that is, 8 bits). In this embodiment, each bit of each 8-bit byte group constitutes a number, which may be read into a one-bit array such that each position of the array contains one bit

第8頁 R Ο ^ £— 五、發明說明(4) 元。 起始位置可能隨機地,擬隨機地或由先前定義的方法選 定。基於此起始位置,位元重新,組合到新的更好地八位元 群組,每個新群組組成一新資訊位元組。用這樣的方法, 每個新位元組代表一擬隨機數字,其與來源資料之資料元 素的數值沒有數值關係。 全部說明書内所使用之「預先定義」名詞係指被定義或 可由使用者或程式所定義者。 此來源資料可以從可用於公開領域,非公開資料庫或任 何數位儲存媒體(DSM )的數位檔案獲得。此檔案可代表文 字序列,影像,音訊序列,視訊序列,座標圖,電腦程式 或任何可使用的數位資料。 不像上述使用於混亂函數的先前技術隨機數字產生器, 本發明使用數位檔案的全部或一部份。數位檔案内容可以 依照選擇起始位置的位置與如何把位元組合而視為隨機 的。因此,有不同起始位置與組合方法的相同數位檔案將 產生出完全不同的擬隨機數位序列。有相同起始位置與相 同組合方法的不同數位檔案也將產生出完全不同的擬隨機 數字序列。這有明顯的好處就是只要使用相同的數位檔 案,相同的起始位置,及相同的組合方法便可以重新產生 相同的擬隨機數字序列。由於此方法不是基於任何數學公 式,因此除了知道來源檔案,起始位置,及組合方法外沒 有方法可以獲得相同的隨機數字序列。 有利的是此擬隨機數字序列是儲存起來用於隱藏Page 8 R Ο ^ £ — 5. Description of the invention (4) Yuan. The starting position may be selected randomly, quasi-randomly or by a previously defined method. Based on this starting position, the bits are reassembled into new and better octet groups, and each new group forms a new information byte. In this way, each new byte represents a quasi-random number, which has no numerical relationship with the value of the data element of the source data. The terms “pre-defined” used throughout this manual refer to those that are defined or can be defined by users or programs. This source material can be obtained from digital files that can be used in the public domain, private databases, or any digital storage media (DSM). This file can represent a text sequence, image, audio sequence, video sequence, coordinate map, computer program, or any available digital data. Unlike the aforementioned prior art random number generators for chaotic functions, the present invention uses all or part of a digital file. The contents of the digital file can be considered random according to the position of the selected starting position and how the bits are combined. Therefore, the same digital file with different starting positions and combining methods will produce completely different pseudo-random digital sequences. Different digital files with the same starting position and the same combination method will also generate completely different pseudo-random number sequences. This has the obvious advantage that as long as you use the same digital file, the same starting position, and the same combination method, you can regenerate the same quasi-random number sequence. Since this method is not based on any mathematical formula, there is no way to obtain the same random number sequence except knowing the source file, starting position, and combination method. Advantageously, this pseudo-random number sequence is stored for hiding

第9頁 五、發明說明(5) (s t e g a η o g r a p h i c )資料編碼或解碼方法,密碼座標編瑪或 解碼方法,或任何其他需要隨機數字序列的意圖。 在另一方面,本發明提供一編碼方法,包括下列步驟: 提供包括已排列第一資料元素的主要資料; 提供包括第二資料元素的次要資料; 以及 對於每個第二資料元素 (i) 與第一資料元素執行一運算,以及 (ii) 由於該運算產生一金匙元素。 在執行該運算之前,在一實施例中,編碼方法包括重新 配置主要資料第一資料元素的步驟。用於重新配置第一資 料元素的技術是可利用的而選擇可以由此技術決定。此選 擇可以隨機地或擬隨機地,或利用一使用者決定。此第一 資料元素可以根據先前定義或是隨機的方法重新配置。類 似的重新配置步驟可以選擇地或附加地執行於次要資料的 第二資料元素。 在一實施例中,主要資料是以一包含第一資料元素之主 要資料陣列的形式以及次要資料是以一包含第二資料元素 之次要資料陣列的形式來表示。此編碼方法可以包括重新 估算主要資料陣列大小以匹配次要資料陣列大小。如果次 要資料陣列小於主要資料陣列,主要資料陣列可以截短以 匹配次要資料陣列大小。如果次要資料陣列大於主要資料 陣列,主要資料陣列的第一資料元素可以重複以便增加第 一資料陣列大小以匹配次要資料陣列大小。在一包括重新Page 9 5. Description of the invention (5) (s t e g a η o g r a p h i c) data encoding or decoding method, cryptographic coding or decoding method, or any other intention that requires a random number sequence. In another aspect, the present invention provides an encoding method including the following steps: providing primary data including a first data element arranged; providing secondary data including a second data element; and for each second data element (i) Perform an operation with the first data element, and (ii) generate a golden key element due to the operation. Before performing the operation, in one embodiment, the encoding method includes a step of reconfiguring the first data element of the main data. The technique for reconfiguring the first data element is available and the choice can be determined by this technique. This selection may be random or quasi-random, or determined by a user. This first data element can be reconfigured according to a previously defined or random method. A similar reconfiguration step may be performed selectively or additionally on the second data element of the secondary data. In one embodiment, the primary data is represented in the form of a primary data array containing a first data element and the secondary data is represented in the form of a secondary data array containing a second data element. This encoding method may include re-estimating the primary data array size to match the secondary data array size. If the secondary data array is smaller than the primary data array, the primary data array can be truncated to match the size of the secondary data array. If the secondary data array is larger than the primary data array, the first data element of the primary data array can be repeated to increase the size of the first data array to match the size of the secondary data array. Included in one

第10頁 4 52 73 2 五、發明說明(6) 配置步驟和重新估算大小步驟的實施例中,重複的第一資 料元素可以依據除了挑選來重新配置第一資料元素第一群 組的技術外的技術重新配置。換言之,雖然主要資料的第 —資料元素可以成倍增加,每個成倍增加的第一資料元素 群組不需要必定依據與第一資料元素第一群組相同的技術 重新配置。此外,每個重複群組可以依據不同技術重新配 置。 執行於第一與第二資料元素之間的運算可以包括一數學 運算,一邏輯運算,一對應函數,或任何其他適用由於此 運算產生金匙元素的運算。更好地,運算是可利用的而選 擇可以經由此運算決定。此選擇可以隨機地或擬隨機地, 或利用一使用者決定。 此編碼方法可以產生與對應的第二資料元素串有關的金 匙元素串,由主要與次要資料產生的唯一金匙資料可以利 用一互補解碼方法儲存,描述如下。 更好的是將此金匙元素儲存於一金匙檔案中,其可以為 了未來使用傳輸或存檔。更有利的是關於編碼方法的資 訊,例如執行運算,重新配置技術等,也都儲存於金匙檔 案中。這些資訊可能儲存於金匙檔案的檔頭或屬性區塊 内。一屬性區塊可以放在金匙檔案的任何位置,不需要在 開頭部分。 上述提到的來源,主要,次要與金匙資料可以以數位二 元形式表示。然而,用於任何方便的符號集合之任何資料 表示形式或標記法皆可以使用,例如字母與數字符號,整Page 10 4 52 73 2 V. Description of the invention (6) In the embodiment of the configuration step and the re-estimation step, the repeated first data element may be based on a technology other than selecting and reconfiguring the first group of the first data element. Technology reconfiguration. In other words, although the first data element of the main data can be multiplied, each multiplied first data element group need not necessarily be reconfigured according to the same technology as the first data element first group. In addition, each repeating group can be reconfigured according to different technologies. The operation performed between the first and second data elements may include a mathematical operation, a logical operation, a corresponding function, or any other operation suitable for generating a key element due to this operation. Better yet, operations are available and choices can be determined through this operation. This choice can be random or pseudo-random, or it can be determined by a user. This encoding method can generate a key element string related to the corresponding second data element string. The unique key data generated from the primary and secondary data can be stored using a complementary decoding method, as described below. It is even better to store this key element in a key file, which can be transferred or archived for future use. More beneficially, information about encoding methods, such as performing calculations, reconfiguration techniques, etc., are also stored in the key file. This information may be stored in the header or attribute block of the key file. An attribute block can be placed anywhere in the key file, and does not need to be at the beginning. The sources mentioned above, primary, secondary and golden spoon data can be represented in digital binary form. However, any data representation or notation used for any convenient collection of symbols can be used, such as alphabetic and numeric symbols, integers

第11頁 452 73 2 五、發明說明(7) 數等。主要資料可以表示或來自一靜態影像,動態視訊, 音訊,文字或其他資訊樣式。同樣地,次要資料可以表示 一靜態影像,動態視訊,音訊,文字或其他資訊。 在本發明較佳形式中,次要資料包括一文字訊息而每個 次要資料元素可以包括一字母與數字符號。然而,每個次 要資料元素可以包括一來自另一符號集合的符號。此字母 與數字符號可以用於構成文字訊息。在本發明典型的應用 中,此文字訊息可以包括關於一包含於主要資料的影像, 視訊,音訊序列的機密資訊。在一實施例中,此文字訊息 可以包括一或更多下列事物:一個標題,一位大師,一版 權持有者,一已付版稅的團體,以及出版者散佈的普遍期 限。 在其他實施例中,文字訊息可以是一機密訊息,一影像 表示法,一音訊序列表示法,或上述的組合。 主要資料可以表示文字訊息,靜態影像,音訊序列,動 態視訊片段,一般多媒體資料,座標檔案,完整程式,或 任何其他可使用的數位資料,其可以擷取於公開區域,例 如網際網路網站,私人資料庫,電腦的隨機存取記憶體或 緩衝儲存器,或任何數位儲存媒體。主要資料的第一資料 元素可以在一陣列中重新配置。 每個第一資料元素可以定義一與靜態影像元素有關的特 性。第一資料元素可以經由代表一數位化靜態影像的資料 串獲得。影像可以經由網際網路網站,數位相機,電腦遊 戲,電腦軟體或其他來源獲得。它可以是一灰階或彩色影Page 11 452 73 2 V. Description of the invention (7) Numbers and so on. The main data can represent or come from a still image, dynamic video, audio, text or other information style. Similarly, secondary data can represent a still image, dynamic video, audio, text, or other information. In a preferred form of the invention, the secondary data includes a text message and each secondary data element may include an alphabetic and numeric symbol. However, each secondary data element may include a symbol from another symbol set. This letter and number symbol can be used to form a text message. In a typical application of the present invention, the text message may include confidential information about an image, video, and audio sequence contained in the main data. In one embodiment, this text message may include one or more of the following: a title, a master, a copyright holder, a royalty-paid group, and a universal deadline distributed by the publisher. In other embodiments, the text message may be a confidential message, an image representation, an audio sequence representation, or a combination thereof. The main data can represent text messages, still images, audio sequences, dynamic video clips, general multimedia data, coordinate files, complete programs, or any other available digital data, which can be retrieved from public areas, such as Internet sites, Private database, computer's random access memory or buffer memory, or any digital storage medium. The first profile element of the master profile can be reconfigured in an array. Each first data element may define a characteristic related to a still image element. The first data element may be obtained via a data string representing a digitized still image. Images can be obtained from Internet sites, digital cameras, computer games, computer software or other sources. It can be a grayscale or color shadow

第12頁 ^52732 5·、發明說明(8) 像(例如其中每個第_ _ 分)以及可以儲存於任 y几素定義一灰階等級或彩色成 TIFF或JPEG。 ' °已知的格式,例如BMP,GIF, 每個第一資料元素可以 訊元素有關的特性。第—$,地或附加地定義一與動態視 態視訊的資料串獲得。:資料元素可以經由代表數位化動 站,視訊光碟(VC^)f播。放位化視訊可以經由網際網路網 遊戲’電腦軟體,數位多=’&雷射影碟(LD )播放器’電腦 源獲得,以及可以儲存於功能影碟(DVD)播放器或其他來 AVI 。 子;任何已知的格式,例如MPEG或 每個第一W ^i|- 7Γ -Γ 訊取樣有關的特性:、數:f擇地或附加地定義-與數位音 音或音樂的資料串J位_訊取樣可以經由代表數位化聲 射影Ϊ器’數位音訊錄音帶(DAT)播放器,雷 以及可,:° 現訊影碟(VCD)播放器或其他來源獲得, 等。以儲"^於任何已知的格式,例如W A V,A I F F,Μ I D I ϊ貝沙* ~實施例數位音訊取樣可以經由用於立體聲重 ί ^兩數位化聲音通道的兩資料串獲得。 隨撬奴碼方法的較佳實施例中’主要資料包括一隨機或擬 立句咨斤幻 在前面三段提及的靜態影像,動態視訊或 皮料可以作為用於根據上述形容的方法產生一擬隨機 列的來源資料。基於原始影像’視訊或音訊資料的 :^列可以作為本發明編碼方法的主要資料。 選擇的實施例中,主要資料可以經由一傳統隨機數Page 12 ^ 52732 5. · Explanation of the invention (8) Images (such as each of them _ _ points) and can be stored in any number of pixels to define a gray level or color into TIFF or JPEG. '° Known formats, such as BMP, GIF, each first data element can be related to the characteristics of the element. Section — $, ground or additionally defines a data string obtained with dynamic video. : The data element can be broadcasted via a digital video station (VC ^) f. Positioned video can be obtained through Internet game ‘computer software, digital multi =’ & laser disc (LD) player ’computer source, and can be stored in a functional video disc (DVD) player or other AVI. Any known format, such as MPEG or each first W ^ i |-7Γ -Γ signal sampling-related characteristics :, number: f optionally or additionally defined-data string with digital audio or music J Bit_sampling can be obtained through a digital audio and video player's digital audio tape (DAT) player, Lei and Ke, ° ° video player (VCD) player or other sources, etc. It is stored in any known format, such as WAV, AIFF, MIDI * Besa * The embodiment digital audio samples can be obtained via two data strings for stereo re-binary digitized sound channels. In the preferred embodiment of the slave code method, the main data includes a static or random image mentioned in the previous three paragraphs. Dynamic video or leather can be used to generate a method based on the above description. Source data to be randomly listed. The: ^ column based on the original image 'video or audio data can be used as the main data of the encoding method of the present invention. In the selected embodiment, the main data can be obtained through a traditional random number.

第13頁 五、發明說明(9) 字產生器或其他適合的來源獲得。 在其他方面,本發明提供一包括第二資料元素的次要資 料解碼方法,該次要資料編碼於金匙元素中使得每個金匙 元素利用與各自的主要資料第一資料元素執行運算產生, 該方法包括這些步驟: 提供該包括已排列之該第一資料元素的主要資料; 提供該金匙元素; 對於每個金匙元素,利用執行該反運算產生該第二資料 元素。 比較存在的隱藏(s t e g a η 〇 g r a p h i c)或數位浮水印技術, 本發明有明顯的優點在於文字長句*任何形式的大量資 料,例如影像,音訊,視訊,或任何二元檔案,可以秘密 地編碼並隨後解碼。對於任何形式的資料,例如影像,音 訊,視訊,二元檔案,數位位元樣式,主要資料的完整從 未受到任何方法影響或危及,就其本身而言,主要資料可 以經由任何裝置例如經由郵件,電子郵件,電話,傳真, 檔案傳輸協定,超文件傳輸協定,撥號網路,局部區域網 路,寬頻區域網路,網際網路,内部網際網路,外部網際 網路,或任何其他電子裝置來傳輸。資料也可以經由任何 儲存媒體,例如硬式磁碟,軟式磁碟,壓縮磁碟,光碟, 數位式錄音帶(D A T ),視訊光碟(V C D ),數位多功能影碟 (DVD)擷取。在一較佳的方法,由於主要資料從未修改, 所以對於每個訊息不需要重新傳遞主要資料。只有金匙資 料需要傳遞。因此,當相較於任何存在的隱藏Page 13 V. Description of the invention (9) Obtained from a word generator or other suitable source. In other aspects, the present invention provides a secondary data decoding method including a second data element, the secondary data is encoded in a key element so that each key element is generated by performing an operation with the first data element of the respective primary data, The method includes the steps of: providing the main data including the first data element arranged; providing the golden key element; and for each golden key element, generating the second data element by performing the inverse operation. Compared with the existing hidden (stega η graphic) or digital watermarking technology, the present invention has obvious advantages in long text * any form of large amount of data, such as video, audio, video, or any binary file, can be secretly encoded And subsequently decoded. For any kind of data, such as video, audio, video, binary file, digital style, the integrity of the main data has never been affected or endangered by any method. For its part, the main data can be transmitted through any device such as mail , Email, phone, fax, file transfer protocol, hyper file transfer protocol, dial-up network, local area network, broadband local area network, internet, internal internet, external internet, or any other electronic device To transmit. Data can also be retrieved from any storage medium, such as hard disk, floppy disk, compressed disk, CD-ROM, digital audio tape (DAT), video CD (VCD), digital versatile video disk (DVD). In a preferred method, since the main data is never modified, there is no need to re-transmit the main data for each message. Only golden spoon data needs to be passed. Therefore, when compared to any existing hidden

第14頁 52 73 2 五、發明說明(ίο) (s t e g a η 〇 g r a p h i c )或浮水印技術日夺’此方法導致較低頻寬 的使用與經由通訊通道更快的傳輸。 在可選擇的實施例中,當開啟或儲存資料,例如網際網 路,光碟,視訊光碟(V CD ),數位多功能影碟(D V D )等的使 用是受限制或約束於傳輸通道接收端時,主要或來源資料 (全部或部分)也可以作為金匙檔案的一部份傳送。此本發 明實施例提供低位準的防護措施但由於其便利性可能會受 某些使用者喜愛。為改善此實施例的防護措施,密碼或其 他保護可以結合本發明實施。此本發明實施例可以構成用 於傳輸保密資訊之大系統的一部份。 在後面的實施例修改版本中,主要或來源資料(全部或 部分)可以作為適合鑑定的單獨檔案傳遞。 圖式簡要說明 包含與構成本發明部分描述的附圖說明本發明實施例以 及用於解釋其原理。然而,需要了解的是圖式與下述的詳 細描述是只有為了說明的目的而產生並不是打算成為本發 明限制的定義。 在圖式中: 圖1表示一用於保密資料傳輸顯示本發明範例應用的背 景圖; 圖2表示包含一兩部分隱藏(steganographic)編碼方法 之本發明較佳實施例的流程圖; 圖3表示一用於隱藏(steganographic)編碼方法重新配 置主要資料檔案的範例;Page 14 52 73 2 V. Description of the invention (ίο) (s t e g a η 〇 g r a p h i c) or watermarking technology gains this day ’This method leads to the use of lower bandwidth and faster transmission via communication channels. In alternative embodiments, when opening or storing data, such as the Internet, optical discs, video compact discs (V CDs), digital versatile video discs (DVDs), etc., the use is restricted or restricted to the receiving end of the transmission channel, The main or source data (in whole or in part) can also be transmitted as part of the key file. This embodiment of the invention provides a low level of protection but may be preferred by some users due to its convenience. In order to improve the protection measures of this embodiment, a password or other protection can be implemented in combination with the present invention. This embodiment of the present invention may form part of a large system for transmitting confidential information. In the modified version of the following embodiments, the main or source data (in whole or in part) can be passed as a separate file suitable for identification. BRIEF DESCRIPTION OF THE DRAWINGS The accompanying drawings, which are included and constitute a part of the description of the invention, illustrate embodiments of the invention and serve to explain its principles. However, it should be understood that the drawings and the detailed descriptions below are definitions which are produced for illustrative purposes only and are not intended to be a limitation of the present invention. In the drawings: FIG. 1 shows a background diagram for displaying the exemplary application of the present invention for confidential data transmission; FIG. 2 shows a flowchart of a preferred embodiment of the present invention including a two-part steganographic encoding method; An example of reconfiguration of the main data file by a steganographic encoding method;

第15頁 五、發明說明(11) 圖4表示一數學運算的範例; 圖5表示一在主要與次要資料之間的邏輯XOR運算的範 例; 圖6表示一 1 : 1對應運算的範例;以及 圖7表示一表現於密碼之隱藏(steganographic)編碼方 法的範例。 較佳實施例描述 本發明的較佳實施例使用來源或主要資料,例如靜態影 像,動態視訊,音訊,文字,或其他資料,來隱藏 (steganographically)編碼次要資料,例如包含機密資訊 的資料檔案。機密資訊可以同樣地包括靜態影像,動態視 訊,音訊,文字,或其他類型資料。此編碼方法產生代表 在已編碼形式之次要資料的唯一金匙資料。 詳細描述如下的本發明實施例包括兩個主要方法。第一 個主要方法使用來源資料,例如靜態影像,動態視訊,音 訊,文字,或其他資料,來產生包含擬隨機數字序列的陣 列。擬隨機數字陣列作為主要資料用於第二個主要方法來 隱藏(steganographically)編碼次要資料。 來源資料可以經由一包含影像,視訊,音訊,文字或其 他資料的檔案提供。為描述方便,此檔案可以歸類為容器 檔案。同樣地,次要資料為了描述方便可以由一歸類為機 密檔案的檔案提供。金匙資料也可以儲存於一歸類為金匙 檔案的檔案。 現在參照圖1 ,它是顯示本發明用於機密資料經由公開Page 15 V. Description of the invention (11) Figure 4 shows an example of a mathematical operation; Figure 5 shows an example of a logical XOR operation between primary and secondary data; Figure 6 shows an example of a 1: 1 correspondence operation; And FIG. 7 shows an example of a steganographic encoding method represented in a password. Description of the Preferred Embodiment The preferred embodiment of the present invention uses source or primary data, such as still images, dynamic video, audio, text, or other data, to steganographically encode secondary data, such as data files containing confidential information . Confidential information can also include still images, motion video, audio, text, or other types of data. This encoding method produces unique key data representing secondary data in encoded form. The detailed description of the embodiment of the present invention includes two main methods as follows. The first main method uses source data, such as still images, dynamic video, audio, text, or other data to generate an array containing a sequence of quasi-random numbers. Quasi-random number arrays are used as the primary data for the second primary method to steganographically encode secondary data. Source data can be provided via a file containing images, video, audio, text or other data. For ease of description, this archive can be classified as a container archive. Similarly, secondary information may be provided for convenience of description by an archive classified as a confidential archive. Key data can also be stored in a file classified as a key file. Referring now to FIG. 1, it is shown that the present invention is used for confidential information via the disclosure

第16頁 4 52 7S^_________ 通訊通道傳輸之,全傳輸的較佳實施例。傳送端l 〇於機密 楢案12執行一隱藏(steganographic)編碼方法η以便產生 唯/的金匙檔案1 3,其可以安全地經由公開通訊通道丨4傳 輸。金匙權案13的接收端15於擷取機密檔案12Α的檔案執 行一互補解碼方法U。 為了隱藏(steganographically)編碼機密檔案12,不是 傳送端1 〇就是編碼方法1 1要從網際網路1 8選擇丨7 —欲下載 19資料檔案用來作為編碼方法11中的容器檔案。在執行編 碼方法11與產生金处標案13之後,傳送端1〇可以將金匙檔 案1 3經由公開通道1 4傳送到接收端1 5。然後接收端1 5可^ 發送一要求20到網際網路18去下載21在其末端相同的容器 檔案並在金匙檔案13上執行解碼方法16。 傳送端1 0與接收端1 5可能已對於一在編碼以及解碼方法 中作為容器播案的特殊網際網路播案取得一致意見。金匙 楷案13可以選擇地在找到用於傳送端之網際網路檔案的 方傳達資訊。 次^述所提到的容器檔案與機密檔案可以包含任何類型的 =$ :因此,我們可以選擇使用音訊檔案編碼視訊檔案: 子權案編碼影像標案,或任何其他的組合。本發明並々 限制使用者採用任一種特別的組合。 例現,參照圖2,它是顯示更詳細地說明本發明較佳實施 3〇~<^部分隱藏(31:^311〇21'31)11丨<:)編碼方法的流程圖。步驟 的第2—與基於來源資料(容器樓案)產生一擬隨機數宇陣列 —個主要方法有關而步驟3 3- 3 7與使用擬隨機數字陣Page 16 4 52 7S ^ _________ Transmission channel, a preferred embodiment of full transmission. The transmitting end 10 executes a steganographic encoding method η in the confidential case 12 in order to generate a unique golden key file 13 which can be transmitted securely via an open communication channel 4. The receiving end 15 of the golden key case 13 executes a complementary decoding method U on the retrieved confidential file 12A. In order to steganographically encode the confidential file 12, either the transmitting end 10 or the encoding method 1 1 must be selected from the Internet 18 8-7 to be downloaded 19 The data file is used as the container file in the encoding method 11. After executing the coding method 11 and generating the gold mark case 13, the transmitting end 10 can transmit the golden key file 13 to the receiving end 15 through the public channel 14. The receiver 15 can then send a request 20 to the Internet 18 to download 21 the same container file at its end and execute the decoding method 16 on the golden key file 13. The transmitting end 10 and the receiving end 15 may have reached an agreement on a special Internet broadcast as a container in the encoding and decoding methods. Golden Key Case 13 can optionally convey information when it finds Internet files for the sender. The container files and confidential files mentioned in the following paragraphs can contain any type of = $: Therefore, we can choose to encode the video file using audio files: sub-encoded image targets, or any other combination. The invention does not restrict the user from using any particular combination. For example, referring to FIG. 2, it is a flowchart showing a more detailed description of the preferred embodiment of the present invention. 30 ~ < ^ partially hidden (31: ^ 311〇21'31) 11 < :) encoding method. Step 2 of this step is related to generating a quasi-random number array based on the source data (container case). Steps 3 3- 3 7 are related to using a quasi-random number array.

第17頁 ^52732 五、發明說明(13) 列作為主要資料產生金匙資料(金匙檔案)來隱藏 (steganographically)編碼次要資料(機密樓案)的第二個 主要方法有關。 主要方法1 此方法基於包含數位資料的來源檔案產生一擬隨機數字 陣列。 在步驟3 0,包含資料位元組的數位來源檔案(容器檔案) 讀入一位元陣列。來源檔案可以是任何檔案類型,其包含 任何資料類型,例如音訊,視訊,影像,文字等。 在步驟3 1,位元陣列的其中一個元素被選擇為起始位 置。此選擇可以由隨機地,擬隨機地或是先前定義的方法 決定。 在步驟3 2,位元陣列的元素重新組合到從起始位置開始 的新位元組(8位元)群組。在此方法中,產生的新群組代 表在可以儲存於陣列的序列中之擬隨機數字。 此方法適合除了基於二(即二進位)以外的數字系統應該 是可以察知的。那就是在來源資料傳送的數位資訊不需要 變換成位元。如果資訊轉變為十進位系統或十六進位的數 字系統等,相同的原理可以應用於產生新的隨機數字。 執行於步驟32的重新組合步驟不需要常常重新組合位元 到八個一組的新群組。假如是使用二進位系統,並且位元 陣列重新組合到位元組,產生的隨機數字範圍將從0到 2 5 5。如果以位元重新組合到一半位元(4個位元),範圍將 會更窄(0 - 1 5 )。對於更大的範圍,群組可以變得更大。對Page 17 ^ 52732 V. Description of the invention (13) The second main method of generating key data (gold key file) as the main data to hide (steganographically) encoded secondary data (secret building case). Main method 1 This method generates a quasi-random number array based on a source file containing digital data. In step 30, the digital source file (container file) containing the data bytes is read into a bit array. The source file can be any file type, which contains any type of data, such as audio, video, image, text, etc. In step 31, one of the elements of the bit array is selected as the starting position. This choice can be determined randomly, quasi-randomly, or by a previously defined method. In step 32, the elements of the bit array are reassembled into a new byte (8-bit) group starting from the starting position. In this method, the new group generated represents a pseudo-random number in a sequence that can be stored in the array. This method should be perceptible for digital systems other than binary (ie, binary) based. That is, the digital information transmitted in the source data does not need to be converted into bits. If the information is converted to a decimal system or a hexadecimal number system, the same principle can be applied to generate a new random number. The recombination step performed in step 32 does not require a new group that often reassembles the bits into groups of eight. If a binary system is used and the bit array is recombined into bytes, the random numbers generated will range from 0 to 2 5 5. If reassembled to half of the bits (4 bits), the range will be narrower (0-1 5). For larger ranges, groups can become larger. Correct

第18頁 4 52732 五、發明說明(14) 於其他數字基底系統,選擇群組的大小同樣地可以修改。 因為此方法不會侷限於任何特別的媒體,使用者有非常 大量的檔案可以選擇並作為容器函數。甚至當使用相同的 檔案時,挑選起始位置的可能性是很多的,此方法的彈性 允許使用者產生許多可能的隨機數字陣列。因此它可以在 隱藏(steganographically)編碼次要資料檔案之前供應用 於格式化來源資料檔案的有效工具。換言之,上述方法為 一較佳的初步方法在實施下述主要方法2之前去實施。 主要方法2 此方法使用主要資料(例如從主要方法1步驟3 2獲得的擬 隨機數字陣列)產生金匙資料(金匙檔案)來隱藏 (steganographically)編碼次要資料(機密擋案)。主要檔 案可以選擇地經由傳統的隨機數字產生器或經由影像,視 訊,文字或其他數位資料檔案獲得。 在圖2的步驟3 3中,主要資料的隨機數字陣列重新配置 以便增加破解密碼的難度。使用者可以利用重新配置隨機 數字陣列提供寬闊的技術選擇以便進一步增加破解的難 度。重新配置技術的選擇可以隨機地決定。例如,密碼可 以作為產生擬隨機數字(例如使用C語言的RAND()函數)的 種子來選擇重新配置技術。使用者可以選擇地允許定義或 選擇重新配置技術來實施。 重新配置技術可以用先前定義或擬隨機的方法。範例包 括:反序配置,用Z字形的方法,或用螺旋形的方法依照 列依照行掃描等。圖3表示一利用反序配置3 9重新配置來Page 18 4 52732 V. Description of the invention (14) For other digital base systems, the size of the selection group can be modified as well. Because this method is not limited to any particular media, users have a very large number of files to choose from and use as container functions. Even when using the same file, there are many possibilities for picking the starting position, and the flexibility of this method allows the user to generate many possible random number arrays. It can therefore provide an effective tool for formatting source data files before they are encoded steganographically. In other words, the above method is a preferred preliminary method to implement before the main method 2 described below. Primary Method 2 This method uses primary data (such as a pseudo-random number array obtained from Step 3 2 of Primary Method 1) to generate golden key data (gold key file) to hide (secondary file) steganographically encoded secondary data. The main file can optionally be obtained through a traditional random number generator or through an image, video, text or other digital data file. In steps 33 of Figure 2, the random number array of the main data is reconfigured to increase the difficulty of cracking the password. Users can reconfigure the random number array to provide a wide choice of technologies to further increase the difficulty of cracking. The choice of reconfiguration technology can be determined randomly. For example, a password can be used as a seed to generate a pseudo-random number (such as using the RAND () function in C) to choose the reconfiguration technique. The user can optionally allow the definition or selection of reconfiguration techniques to be implemented. Reconfiguration techniques can use previously defined or quasi-random methods. Examples include: reverse order configuration, zigzag method, or spiral method to scan in columns and rows. Figure 3 shows a reconfiguration using reverse order configuration 9 9

第19頁Page 19

4f^273L 五、發明說明(15) 自容器檔案3 8之典型資料串的範例。依照進一步的範例, 螺旋形方法需要首先讓元素在X位置,然後元素在X+ 1位 置,然後元素在(X-1 )位置,然後(X+2)位置,然後(X-2) 位置,並以此類推。 如果我們感覺應用隨機數字產生器於來源資料檔案所產. 生的不可預測性程度是足夠的,重新配置步驟是非必須的 並可以省略。在此較佳實施例中,隨機數字陣列重新配置· 以產生更高的不可預測性程度。 在步驟3 4主要資料隨機數字陣列可以重新估算大小以匹 配包含於機密檔案内之第二資料元素的次要資料陣列大 小。隨機數字陣列可以大或小於次要資料陣列。因此隨機 數字陣列不是要截短就是要重複以便匹配次要資料陣列大 小。因此,不管是取決於陣列大小或已執行或將在此方法 隨後步驟執行的運算類型,這個步驟是需要的。 在次要資料陣列大於隨機數字陣列的情況下,重複所有 或部分的隨機數字陣列而且重複的隨機數字可以根據不同 技術重新配置(在步驟3 3 )。在此方法中,更多的隨機數字 可以由在步驟35隨後的運算提供,描述如下。 在步驟35,至少一運算執行於隨機數字陣列元素與包含 於機密檔案内的次要資料陣列元素之間。這導致包含運算 結果的金匙陣列。 因為每個運算在至少一個隨機數字與至少一個次要資料 元素之間,所獲得的結果甚至對於類似的次要資料元素也 是不一樣的。例如,給定一隨機數字陣列[3 , 5, 2,…]4f ^ 273L V. Description of the invention (15) Example of a typical data string from the container file 38. According to a further example, the spiral method requires that the element is first at the X position, then the element is at the X + 1 position, then the element is at the (X-1) position, then the (X + 2) position, then the (X-2) position, and And so on. If we feel that the application of a random number generator to the source data file is sufficient, the degree of unpredictability is sufficient. The reconfiguration step is unnecessary and can be omitted. In this preferred embodiment, the random number array is reconfigured to produce a higher degree of unpredictability. In step 34, the random data array of primary data can be re-estimated to match the size of the secondary data array of the second data element contained in the confidential file. The random number array can be larger or smaller than the secondary data array. Therefore the random number array is either truncated or repeated to match the size of the secondary data array. Therefore, this step is required regardless of the size of the array or the type of operation that has been performed or will be performed in subsequent steps of this method. In the case where the secondary data array is larger than the random number array, all or part of the random number array is repeated and the repeated random numbers can be reconfigured according to different technologies (at step 3 3). In this method, more random numbers can be provided by the subsequent operations in step 35, as described below. In step 35, at least one operation is performed between the random number array element and the secondary data array element contained in the confidential file. This results in an array of golden keys containing the results of the operation. Because each operation is between at least one random number and at least one secondary data element, the results obtained are different even for similar secondary data elements. For example, given an array of random numbers [3, 5, 2, ...]

第20頁 452?3^ 五、發明說明(16) 以及第二資料元素陣列[1 , 3, 1,...],而如果選擇的運 算是隨機數字減去第二資料元素,所獲得的金匙陣列將是 [2, 2, 1,...]。因為在編碼方法利用隨機數字,所以次 要資料陣列的第一與第三元素是相同的但是產生出不同的 金匙元素。這是本發明的重要優點因為這使得破解密碼更_ 困難。 此外,本發明沒有限制使用者選擇所要執行的運算,如· 此使得破解甚至更困難。 不同運算類型可以執行,包括如下: (i )數學運算,例如減法。如圖4所示這樣的運算範例, 其中隨機數字陣列的第一資料元素4 1減去機密資料檔案的 第二資料元素40以產生金匙元素42。其他數學運算可以包 括加法,乘法等。 (ii)邏輯運算,例如XOR運算。這樣的運算表示於圖5, 其中每個第二資料元素50的每個位元與每個第一資料元素 51的對應位元執行XOR運算以產生每個金匙元素52的結果 位元。 (i i i ) 1 : 1對應函數。這樣函數的範例說明於圖6,其中 對應是基於第二資料元素指定的指標位置。例如,如果第 二資料元素6 0的内容有一數值” 2 ” ,則"2 ”就作為指標指向 隨機數字61的位置2。隨機數字61的位置2有一數值18”而 這就作為儲存於金匙陣列的對應金匙元素6 2之數值。 欲執行運算的選擇可以隨機地決定。例如,密碼可以作 為產生擬隨機數字(例如使用C語言的R A N D ()函數)的種子Page 20 452? 3 ^ V. Description of the invention (16) and the second data element array [1, 3, 1, ...], and if the selected operation is a random number minus the second data element, the obtained The golden spoon array will be [2, 2, 1, ...]. Because random numbers are used in the encoding method, the first and third elements of the secondary data array are the same but produce different key elements. This is an important advantage of the present invention because it makes cracking passwords more difficult. In addition, the present invention does not restrict the user to select the operation to be performed, which makes cracking even more difficult. Different types of operations can be performed, including the following: (i) Mathematical operations, such as subtraction. An example of this operation is shown in Fig. 4, where the first data element 41 of the random number array is subtracted from the second data element 40 of the confidential data file to generate a golden key element 42. Other mathematical operations can include addition, multiplication, and so on. (ii) Logical operations, such as XOR operations. Such an operation is shown in FIG. 5, where each bit of each second data element 50 and a corresponding bit of each first data element 51 perform an XOR operation to generate a result bit of each key element 52. (i i i) 1: 1 corresponds to the function. An example of such a function is illustrated in Figure 6, where the correspondence is based on the index position specified by the second data element. For example, if the content of the second data element 60 has a value "2", then "2" is used as an index to point 2 of the random number 61. The position 2 of the random number 61 has a value 18 "and this is stored as gold The value of the corresponding key element 6 2 of the key array. The choice of the operation to be performed can be determined randomly. For example, a password can be used as a seed for generating a pseudo-random number (such as using the R A N D () function in C)

第21頁 4 5 ο 一. 五'發明說明(17) 來選擇欲執行的運算。使用者可以選擇地被允許定義或選 擇執行運算。 再次參照圖2的步驟3 5,運算結果儲存於金匙陣列中。 在步驟3 6,關於編碼方法的資訊儲存於檔頭或屬性檔案, 其在步驟37與來自金匙檔案的金匙陣列結合。金匙檔案的 資訊檔頭與屬性區塊包含執行互補解碼方法1f1所有需要的 資訊。這樣的資訊可以包括容器檔案的物理位置,擬隨機 數字產生方法的起始位置,重新配置隨機數字陣列的技術 與裝置,執行的運算等。 編碼方法可以隨意地包括一密碼特徵以增加安全性。傳 送端可以提供也放入編碼方法的密碼。在另一端,接收端 可以提示鍵入密碼並執行傳送端提供之已編碼密碼的解 碼。只有解碼的密碼匹配傳送端所提供的密碼,解碼方法 才會開始重新產生機密檔案。此方法說明於圖7,其中一 包含密碼"He 1 loWor Id"的密碼陣列70由美國資訊交換標準 碼(ASCII)72,101,108等代表。隨機數字71減去這些 ASCI I碼以創造金匙元素72。這些金匙元素儲存於金匙檔 案的屬性區塊。 應該要了解的是表示於圖1的資料傳輸應用可以或可以 不包含表示於圖2的兩部分編碼方法。例如,用於產生容 器檔案之擬隨機數字陣列的第一個主要方法可以省略。在 這情況下,容器檔案可以在編碼方法中作為主要資料來取 代隨機數字陣列。 而且,應該要了解的是在編碼方法,主要方法2,内的P.21 4 5 ο 5. Description of the invention (17) to select the operation to be performed. The user can optionally be allowed to define or choose to perform operations. Referring to steps 35 of FIG. 2 again, the operation result is stored in the golden key array. In step 36, the information about the encoding method is stored in the header or attribute file, which is combined with the golden key array from the golden key file in step 37. The information header and attribute blocks of the golden key file contain all the information needed to perform the complementary decoding method 1f1. Such information may include the physical location of the container file, the starting position of the pseudo-random number generation method, the technology and device for reconfiguring the random number array, and the operations performed. The encoding method can optionally include a cryptographic feature to increase security. The sender can provide a password that is also put into the encoding method. At the other end, the receiving end can prompt for a password and perform the decoding of the encoded password provided by the transmitting end. Only when the decoded password matches the password provided by the sender, the decoding method will start to regenerate the confidential file. This method is illustrated in Fig. 7. One of the password arrays 70 including the password "He 1 loWor Id" is represented by American Standard Code for Information Interchange (ASCII) 72, 101, 108, and the like. The random number 71 is subtracted from these ASCI I codes to create the golden key element 72. These golden key elements are stored in the attribute block of the golden key file. It should be understood that the data transmission application shown in FIG. 1 may or may not include the two-part encoding method shown in FIG. 2. For example, the first main method for generating a pseudorandom number array of container files can be omitted. In this case, the container file can be used as the main data in the encoding method to replace the random number array. Moreover, it should be understood that in the coding method, the main method 2,

第22頁 452732 五、發明說明(18) 重新配置與重新估算步驟是非必須的而且可以省略。 互補解碼方法對於來自存在於此之資訊的技術能力是熟 習此項技藝之人士由其中所呈現的資訊便可不辯自明。因 此解碼方法不需要詳細描述。很明確地,解碼方法的關鍵 部分是執行在編碼方法執行的反運算。如果在編碼方法已 經執行主要資料(即隨機數字陣列)的重新配置與重新估算 大小,詳情必須儲存於金匙檔案的屬性區塊或別處以便反 運算可以在解碼方法執行。同樣地,如果已經從用於主要 方法1的來源資料檔案產生隨機數字陣列,相同的隨機數 字陣列必須再度由用於解碼金匙檔案的來源資料檔案重新 產生。 發明優點 (A )次要資料大小不受限制 比較現存的隱藏(s t e g a η 〇 g r a p h i c )或浮水印技術,本 發明有不同的優點,就是文字長句,任何類型資料例如影 像,音訊,視訊,二進位檔案的大量資料可以編碼(掩蔽) 並隨後秘密地解碼。 (B)主要資料或次要資料沒有失真 對於任何類型資料例如影像,音訊,視訊,二元檔 案,數位位元模式等,主要資料或次要資料的完整性在任 何狀況都從未受到影響或危及。換言之,此解碼技術是無 損失的。主要資料可以隨意地以任何類型如經由郵件,電 話,電子郵件,傳真,檔案傳輸協定,超文件傳輸協定, 撥號網路,寬頻區域網路,網際網路,内部網際網路,外Page 22 452732 V. Description of the invention (18) The reconfiguration and re-estimation steps are unnecessary and can be omitted. Complementary decoding methods are self-evident to the information presented by those who are skilled in the technology from the information that exists here. Therefore, the decoding method need not be described in detail. Clearly, the key part of the decoding method is to perform the inverse operation performed in the encoding method. If the reconfiguration and resizing of the main data (ie, random number array) has been performed in the encoding method, the details must be stored in the attribute block of the key file or elsewhere so that the inverse operation can be performed in the decoding method. Similarly, if a random number array has been generated from the source data file used for Main Method 1, the same random number array must be regenerated from the source data file used to decode the key file. Advantages of the invention (A) The size of the secondary data is not limited compared to the existing hidden (stega η graphic) or watermark technology. The present invention has different advantages, that is, long sentences, any type of data such as images, audio, video, etc. A large amount of information in the carry file can be encoded (masked) and subsequently secretly decoded. (B) No distortion of primary or secondary data For any type of data such as video, audio, video, binary file, digital mode, etc., the integrity of the primary or secondary data has never been affected or Endangered. In other words, this decoding technique is lossless. The main information can be freely used in any type such as via mail, telephone, e-mail, fax, file transfer protocol, hyper file transfer protocol, dial-up network, broadband LAN, Internet, internal Internet, external

第23頁 452732 五、發明說明(19) 部網際網路,或任何其他電子裝置來傳輸。資料也可以經 由任何儲存媒體,例如硬式磁碟,軟式磁碟,壓縮磁碟, 數位式錄音帶(DAT),光碟,視訊光碟(VCD),雷射影碟 (LD),數位多功能影碟(DVD)擷取。本發明有一個重大的 優點超越傳統方法,例如最不重要位元(L S B )解碼,其加 重失真負擔於資料中,因此整個容器檔案必須傳送。除此 之外,L S B解碼允許只有高位元深度容器檔案可以使用, 因此這不適合用於大部分多媒體資料。 (C)較低頻寬使用與較快傳輸 在較佳的方法中,由於主要資料從未修改過,所以不 需要傳送或重送每個訊息的主要資料。只有金匙檔案需要 傳送。相較於需要傳送整個容器檔案的傳統方法,這導致 減少使用的儲存空間。因此,相較於任何現存的隱藏 (s t e g a η 〇 g r a p h i c )或浮水印技術,此方法導致在通訊通道 下較低頻寬使用與較快傳輸。 (D )主要資料類型與次要資料類型不受限制 現存的隱藏(steganographic)與浮水印技術通常有低 位元深度位圖(例如黑白影像),低位元深度音訊與視訊檔 案的問題。這通常是由於改變低位元深度的最不重要位元 會改變原始資訊過多的問題。這限制了現存隱藏 (s t e g a η 〇 g r a p h i c )或浮水印技術只適用於大位元深度槽 案,例如2 4位元位圖等。然而,由於本發明保持主要資料 與次要資料兩者的完整,所以它不會遭遇此問題並可以使 用於任何主要資料類型或次要資料類型。Page 23 452732 V. Description of Invention (19) Internet, or any other electronic device. Data can also be transferred via any storage medium such as hard disk, floppy disk, compressed disk, digital audio cassette (DAT), optical disc, video disc (VCD), laser disc (LD), digital versatile disc (DVD) Capture. The invention has a significant advantage over traditional methods, such as the least significant bit (LSB) decoding, which adds distortion to the burden on the data, so the entire container file must be transmitted. In addition, LSB decoding allows only high-bit depth container files to be used, so this is not suitable for most multimedia materials. (C) Lower bandwidth usage and faster transmission In the better method, since the main data is never modified, there is no need to send or resend the main data of each message. Only golden key files need to be sent. This results in reduced storage space compared to traditional methods that require the entire container file to be transferred. Therefore, compared with any existing hidden (ste g a η 〇 g r a p h i c) or watermarking technology, this method results in lower bandwidth usage and faster transmission under the communication channel. (D) Unrestricted primary and secondary data types. Existing steganographic and watermarking techniques often have problems with low-bit-depth bitmaps (such as black and white images), low-bit-depth audio, and video files. This is usually because changing the least significant bit of the low bit depth will change the problem of too much original information. This restricts the existing hiding (ste g a η 〇 g r a p h i c) or watermarking techniques that are only applicable to large-bit depth slots, such as 24-bit bitmaps. However, since the present invention maintains the integrity of both the primary and secondary data, it does not suffer from this problem and can be used with any primary or secondary data type.

第24頁 452732 五、發明說明(20) (E)唯一產生的金匙資料 上述揭露的發明有另外與其他不同的優點,就是甚至 在相同的主要資料與次要資料下,產生的金匙資料常常不 同並且是唯一的。這使得對於任何不法使用者來說利用分 析產生的金匙資料去破解密碼幾乎是不可能的。 (F )不同的重新配置技術 許多重新配置技術可以於本發明實施。這意謂不法使 用者為了破解密碼必須試圖嘗試所有的重新配置技術。假 定破解單一技術已經是一個極困難的工作,破解密碼實際 上已變成不可能。 (G)無限量可用的主要資料 對於網際網路通訊的驚人成長,在網際網路上可用的 主要資料檔案數目實際上是無限大的。因此,合法使用者 可以選擇網際網路上的影像,音訊,視訊或任何數位二元 檔案來作為主要資料。因此,沒有主要資料的認識,不法 使用者必須在他們可以開始進行破解任務前嘗試無限大數 目的影像,音訊以及視訊檔案。 (Η)密碼保護與無用輸入無用輸出 (garbage-in-garbage-out)系統 本發明包括一無用輸入無用輸出密碼保護系統。密碼 可以用於產生隨機重新配置方法與/或主要資料與/或次要 資料開始的起始位置。由於這設計成無用輸入無用輸出系 統,它不需要給予任何關於密碼是否無效或主要資料是否 無效的線索。因此,即使不法使用者設法得到主要資料檔Page 24 452732 V. Description of the invention (20) (E) The only golden key data generated The invention disclosed above has other advantages, that is, the golden key data generated even under the same primary and secondary data Often different and unique. This makes it almost impossible for any illegal user to use the key data generated by the analysis to crack the password. (F) Different reconfiguration techniques Many reconfiguration techniques can be implemented in the present invention. This means that unscrupulous users must try all reconfiguration techniques in order to crack the password. It is assumed that cracking a single technology is already a very difficult task, and cracking a password is practically impossible. (G) Unlimited amount of primary data available For the phenomenal growth of Internet communications, the number of primary data files available on the Internet is virtually unlimited. Therefore, legitimate users can choose images, audio, video, or any digital binary file on the Internet as the main data. Therefore, without the knowledge of the main data, illegal users must try an infinite number of images, audio and video files before they can start the cracking task. (Ii) Password protection and garbage-in-garbage-out system The present invention includes a passwordless protection system for useless input and useless output. The password can be used to generate the starting position of the random reconfiguration method and / or primary data and / or secondary data. Because this is designed as a useless input and useless output system, it does not need to give any clues as to whether the password is invalid or the master data is invalid. Therefore, even if the unscrupulous user manages to get the master data file

第25頁 五、發明說明(21) 案的資訊,這已經是非常困難,不斷地沒有成功破解金匙 檔案而得到不同密碼可能最後誘使不法使用者認為此主要 資料檔案不是正確的檔案。 (I)產生新容器檔案 只有合法使用者知道的唯一主要資料檔案可以輕易地產 生。這些範例可以是合法使用者的數位影像,合法使用者 的音訊語音,以及合法使用者的視訊夾。 發明典型應用 在一實施例中,本發明可以用於機密資料通訊。在較佳 的方法中,主要資料可以預先決定而產生的金匙檔案可以 經由如郵件,電話,電子郵件,傳真,檔案傳輸協定,超 文件傳輸協定,撥號網路,寬頻區域網路,網際網路,内 部網際網路,外部網際網路,或任何其他電子裝置傳輸給 合法使用者。我們發現需要傳送的金匙檔案大小幾乎等於 實際訊息的大小,通常在低於1 0位元組的上限内° 在另一實施例中,本發明可以實施作為一插頭用於網際 網路網站瀏覽器,電子郵件程式,製圖法程式,文件程式 或任何其他電腦程式以便機密檔案可以隱藏並只傳送給合 法使用者。 在另一實施例中,想要保護其資料的軟體開發者也可以 應用上述揭露的發明。例如,在微軟W 〇 r d中,程式可以使 用密碼與文件本身去隱藏原始資料。因此,即使其他程式 可以開啟微軟Word文件,開啟的檔案將仍然顯示成無法得 知的資料。在相同的方法,此實施例可以延伸到其他程Page 25 V. Description of the invention (21), this is already very difficult. Continuously failing to crack the key file and obtaining different passwords may finally lead the illegal user to think that this main data file is not the correct file. (I) Generate new container files. The only major data file known to legitimate users can be easily generated. Examples could be digital images of legitimate users, audio voices of legitimate users, and video folders of legitimate users. Typical Application of the Invention In one embodiment, the present invention can be used for confidential data communication. In the preferred method, the key data generated by the main data can be determined in advance. Route, internal internet, external internet, or any other electronic device to legitimate users. We found that the size of the key file to be transmitted is almost equal to the size of the actual message, usually within the upper limit of 10 bytes. In another embodiment, the present invention can be implemented as a plug for Internet website browsing Device, email program, graphics program, document program or any other computer program so that confidential files can be hidden and only sent to legitimate users. In another embodiment, software developers who want to protect their data can also apply the disclosed invention. For example, in Microsoft Word, the program can use the password and the file itself to hide the original data. Therefore, even if other programs can open Microsoft Word documents, the opened files will still be displayed as unknown data. In the same way, this embodiment can be extended to other processes

第26頁 452?3c 五、發明說明(22) 式,例如電子郵件程式如E X c h a n g eTM或製圖軟體如 AutoCAD®。 在另外的實施例中,本發明可以用於傳送訊息修改檢測 作為一資料檢驗者。當傳送端的數位識別標誌可以視為次 要資料時,在此實例的傳送訊息可以視為主要訊息,反之 亦然。在接收訊息上,接收端可以解碼它以檢測實際的傳 送端是否傳送它並檢查此訊息是否修改過。 在另一實施例中,機密資訊或鑑定碼可以儲存於信用 卡,護照,身分證,金融卡,或任何主要資料與次要資料 兩者皆存在的裝置。例如在信用卡個案中,當關於擁有 者,他/她的帳號或鑑定碼的資訊可以視為次要資料時, 信用卡擁有者的生物測定(例如照片,指紋,聲音等)可以 作為主要資料,反之亦然。在這樣的個案中,如果試圖改 變信用卡擁有者的生物測定,解碼機密資訊或鑑別碼將不 吻合。 在另一實施例中,此技術可以用於產生任何數位影像, 文字,音訊,視訊或其他數位資料的數位浮水印。當數位 浮水印可以視為次要資料(機密檔案)時,此影像,文字, 音訊,視訊或數位資料可以視為主要資料(容器檔案)。在 編碼方法中,金匙檔案將根據此揭露發明產生。合法使用 者將握有唯一的金匙檔案並且他可以使用它去解碼來自主 要資料的數位浮水印,從那裡驗證主要資料的來源。 在另一實施例中,部分當前發明(上述的主要方法1 )可 以用於密碼學領域。在密碼學中,沒有使用容器檔案於隱Page 26 452? 3c V. Description of invention (22), such as e-mail programs such as E X c h n n eTM or drawing software such as AutoCAD®. In another embodiment, the present invention can be used to transmit message modification detection as a data verifier. When the digital identification mark on the transmitting end can be regarded as the secondary data, the transmitting message in this example can be regarded as the primary message, and vice versa. On the received message, the receiver can decode it to detect whether the actual sender transmitted it and check if the message has been modified. In another embodiment, the confidential information or identification code may be stored on a credit card, passport, ID card, debit card, or any device where both primary and secondary data are present. For example, in the case of a credit card, when the information about the owner, his / her account number or identification code can be regarded as secondary information, the biometrics (such as photos, fingerprints, sounds, etc.) of the credit card owner can be used as the main information, and vice versa The same is true. In such cases, if an attempt is made to change the biometrics of the credit card owner, decoding the confidential information or authentication code will not match. In another embodiment, this technique can be used to generate a digital watermark of any digital image, text, audio, video or other digital data. When the digital watermark can be considered as secondary data (confidential file), this image, text, audio, video or digital data can be considered as primary data (container file). In the encoding method, a golden key file will be generated based on this disclosed invention. The legitimate user will have a unique golden key file and he can use it to decode the digital watermark from the main data and verify the source of the main data from there. In another embodiment, part of the current invention (main method 1 described above) can be used in the field of cryptography. In cryptography, container files are not used

第27頁 45^732 ^ 案號88119232 年《月曰 修正 年月 日修正/更正/補充 五、發明說明(23) 藏方法(steganography)個案中。反而使用一混亂函數去 解碼加密訊息。此混亂函數可以是只有傳送端與接收端知 道的密碼串或是非常大的質數。因此,使用主要方法1產 生的擬隨機數字序列可以用於代替任何混亂函數。再者, 鑑於許多可能的數位檔案皆可使用於公開與秘密的區域, 以及容易製造新數位檔案,破解擬隨機數字陣列如果不是 不可能也將是極為困難。 在另一個實施例中,當前發明也可以互補地應用於密碼 學領域。使用當前發明,不是混亂函數就是加密訊息可以 編碼並隨後解碼以增加安全性。使用當前發明產生的金匙 檔案在傳輸到傳送端前可以選擇地加密以隨後在隱藏 (steganographically)解碼之前解密 ° 可以預期的是本發明將在一般用途的電腦平台上用軟體 塑造與實施。本發明可以選擇地使用硬接線電路系統,中 央處理器(CPU),數位信號處理(DSP)實施並併入一或更多 應用特定積體電路(ICs)。更進一步,可以預期的是本發 明可以嵌進傳真機,電話,數位相機,手提無線電話機或 其他電子訊息裝置去赋予編碼及解碼機密資訊的能力。 最後,這些技術能力將會察知不同適應性的變化而剛剛 描述較佳實施例的修改在沒有背離本發明的範圍與精神下 可以裝配。因此,需要了解的是在附加申請專利範圍的範 圍内,除了於此特別描述之外,本發明可以實行。 圖式元件符號說明 I 0 傳送端 II 隱藏編碼方法Page 27 45 ^ 732 ^ Case No. 88119232, "Month and Month Amendment Year / Month / Day Amendment / Correction / Supplement" V. Description of Invention (23) Steganography case. Instead, a scramble function is used to decode the encrypted message. The chaos function can be a cipher string known only to the transmitting end and the receiving end or a very large prime number. Therefore, the quasi-random number sequence generated using the main method 1 can be used instead of any chaotic function. Furthermore, given that many possible digital files can be used in public and secret areas, and it is easy to create new digital files, it would be extremely difficult if not impossible to break the pseudo-random number array. In another embodiment, the current invention can also be applied complementaryly in the field of cryptography. Using the current invention, either the chaotic function or the encrypted message can be encoded and subsequently decoded for added security. The golden key file generated using the current invention can optionally be encrypted before being transmitted to the transmitting end and then decrypted before being steganographically decoded. It is expected that the present invention will be shaped and implemented in software on a general-purpose computer platform. The present invention may optionally be implemented using hard-wired circuit systems, central processing units (CPUs), and digital signal processing (DSPs) to incorporate one or more application specific integrated circuits (ICs). Furthermore, it is expected that the present invention can be embedded in a facsimile, a telephone, a digital camera, a portable radiotelephone or other electronic messaging devices to give the ability to encode and decode confidential information. Finally, these technical capabilities will be able to detect changes in different adaptability and the modifications of the preferred embodiment just described can be assembled without departing from the scope and spirit of the invention. Therefore, what needs to be understood is that within the scope of the additional patent application, the present invention can be practiced except as specifically described herein. Schematic component symbol description I 0 Transmitter II Hidden coding method

61155.ptc 第28頁 2001.06. 27.028 々52 7 案號 88119232 年 €月日 修正 五、發明說明(2¾) 12, 1 2A 13 1 4 15 16 17 18 19 20 2 1 30-37 38 39 40 41 42 50 5 1 52 60 6 1 62 70 7 1 72 機密檔案 金匙檔案 公開通訊通道 接收端 解碼方法 選擇 網際網路 欲下載資料檔案 要求 下載 步驟 容器 反序 第二 第一 金匙 第二 第一 金匙 第二 隨機 金匙 密碼 隨機 金匙 檔案 配置 貢料元素 資料元素 元素 資料元素 資料元素 元素 資料元素 數字 元素 陣列 數字 元素61155.ptc Page 28 2001.06. 27.028 々52 7 Case No. 88119232 € Month Day Amendment V. Description of Invention (2¾) 12, 1 2A 13 1 4 15 16 17 18 19 20 2 1 30-37 38 39 40 41 42 50 5 1 52 60 6 1 62 70 7 1 72 Confidential file key file public communication channel Receiver decoding method selection Internet to download data file Request download step Container reverse order Second first key Second second key Second Random Key Password Random Key File Configuration Tribute Element Data Element Data Element Data Element Data Element Data Element Digital Element Array Digital Element

61155.ptc 第28a頁 2001.06.27.02961155.ptc Page 28a 2001.06.27.029

Claims (1)

、申請專利範園 1. 一,,生擬隨機數字序列的方法,包括下列步驟: 提:匕括多個已排列資料元素的來源資料,每個資料 TL素内谷以一數字群組來表示; 將數字群組讀人_ _ 1 Λ — 車歹丨中’使得陣列的每個位置包含 該#數子之一; 在數字陣列内選擇—相 ^ Λ Α 起始位置:以及 ρ重數字以構成參考起始位置的新數字群組, 使::::數子群組代表一擬隨機數字而連續的新數字群 組代表該擬隨機數字序列。 另外包括儲存該擬隨 其中資料元素以二元 其中每個新數字群組 其中起始位置可以隨 其中起始位置可以用 2. 如申請專利範圍第丨項之方法 機數字序列的步驟。 3. 如申請專利範圍第1項之方法 標記法表不。 4. 如申請專利範圍第3項之方法 包括八個二元數字。 5. 如申請專利範圍第1項之方法 機地或擬隨機地選擇。 6. 如申請專利範圍第1項之方法 先前定義的方法來選擇。 7. —種編碼方法利用如申請專利範圍第丨項之方法產生 擬隨機數字序列° 8. —種解碼方法利用如申請專利範圍第丨項之方法產生 擬隨機數字序列。 9. 一種編碼方法,包括下列步驟:2. Application for Patent Fanyuan 1. First, the method of generating a random number sequence includes the following steps: mention: Source data of multiple arranged data elements, each data TL element inner valley is represented by a number group Read the group of numbers _ _ 1 Λ — in the car so that each position of the array contains one of the # numbers; select within the number array — phase ^ Λ Α starting position: and ρ heavy numbers to A new group of numbers constituting the reference starting position, such that :::: number subgroups represent a quasi-random number and consecutive new groups of numbers represent the quasi-random number sequence. In addition, it includes the steps of storing the proposed data element in which each data element is binary, and each new number group, where the starting position can be followed, and the starting position can be used. 2. Such as the method of applying for the scope of patent application. 3. If the method of the first scope of patent application is applied, the marking method is not used. 4. The method for applying for item 3 of the patent scope includes eight binary numbers. 5. If the method of applying for the scope of the first item of the patent scope is selected on the spot or randomly. 6. Select the method as defined in the first patent application scope. 7. — A coding method generates a quasi-random number sequence using a method such as the first item in the scope of patent application. 8. — A decoding method uses a method such as the sphere item in the patent application to generate a pseudo-random number sequence. 9. An encoding method comprising the following steps: O:\61\61155.PTD 第29頁 ..1 52 73 2 六、申請專利範圍 提供包括已排列資料元素的來源資料: 提供包括第二資料元素的次要資料;以及 對於每個第二資料元素 (i) 與第一資料元素執行一運算,以及 (ii) 由於該運算產生一金起元素。 1 0 .如申請專利範圍第9項的編碼方法,在執行該運算之 前,包括下列步驟: 重新配置主要資料的第一資料元素。 1 1 .如申請專利範圍第1 0項的編碼方法,其中用於重新 配置第一資料元素的技術是可利用的而至少一個選擇可以 經由這些技術決定。 1 2 .如申請專利範圍第1 1項的編碼方法,其中一個或每 個選擇可以隨機地會擬隨機地決定。 1 3.如申請專利範圍第1 1項的編碼方法,其中一個或每 個選擇可以經由先前定義的方法決定。 1 4.如申請專利範圍第1 1項的編碼方法,包括下列步 驟: 儲存金匙於金匙檔案;以及 儲存關於一或每個選擇的重新配置技術於金匙檔案的 屬性區塊。 1 5.如申請專利範圍第1 0項的編碼方法,其中第一資料 元素可以用先前定義的方法重新配置。 1 6.如申請專利範圍第1 0項的編碼方法,其中第一資料 元素可以用隨機或擬隨機的方法重新配置。O: \ 61 \ 61155.PTD Page 29..1 52 73 2 VI. Patent application scope Provide source data including arranged data elements: Provide secondary data including second data elements; and for each second data Element (i) performs an operation with the first data element, and (ii) the operation generates a gold element. 10. If the coding method of item 9 of the scope of patent application, before performing the operation, includes the following steps: Reconfigure the first data element of the main data. 11. The coding method as described in item 10 of the patent application scope, wherein a technique for reconfiguring the first data element is available and at least one choice can be determined by these techniques. 12. As for the coding method of item 11 in the scope of patent application, one or each of these choices can be randomly determined to be randomly determined. 13 3. As for the coding method of item 11 in the scope of patent application, one or each of the selections can be determined by a previously defined method. 14. The encoding method according to item 11 of the scope of patent application, including the following steps: storing the golden key in the golden key file; and storing the attribute block of one or each selected relocation technology in the golden key file. 1 5. The coding method of item 10 in the scope of patent application, wherein the first data element can be reconfigured by a previously defined method. 16. The coding method according to item 10 of the patent application range, wherein the first data element can be reconfigured by a random or quasi-random method. 第30頁 4 52 73 六、申請專利範圍 1 7.如申請專利範圍第9項的編碼方法,在執行該運算之 前包括下列步驟: 重新配置次要資料的第二資料元素。 1 8.如申請專利範圍第9項的編碼方法,其中主要資料是 以一包含第一資料元素之主要資料陣列的形式以及次要資 料是以一包含第二資料元素之次要資料陣列的形式來表 示,而且包括下列步驟: 重新估算主要資料陣列大小以匹配次要資料陣列大 算 估 新 重 中 其 法 方 碼 編 的 項 列 料 資 要 主 於 ' -/* 列 :_ 驟料 步資 列要 下次 括果 包如 大 要 主 短 列 要 主 複 列 Wh 一 料 資 要 主 於 大 列 * ?一 料 資 要 次 及果 以如 列 素 元 料 資 I 第 的 算 玄 =0 行 執 在 法 方 碼 編 的 項 9 11 第 圍 範 利 專 請 中 如 元外 料之 資術 一技 第個 的一 列第 陣該 要了 主除 置外 配另 新或 重術 術技 技個 個一 一第 第該 據據 根根 括及 包以 前, 之素 驟 步 些 這 的 素 元 料站 資 一的 項 第9 的第 複圍 重範 置利 配專 新請 重申 術如 支 1 I 2 的 第 與- 第 中 其 法 方 資 二 第 與 一 第 在 括 包 算 PBC ^ 個 每 中 其。 而算 表運 代學 字數 數的 以間 素之 元素 料元 資料 項 9表 第法 圍記 範標 利元 專二 請以 申素 如元 2料 2 对 資 的 法 方 第 與- 第 中 其 第 與 1 第 在 括 包 算 "*11 運 個 每 而 示Page 30 4 52 73 6. Scope of patent application 1 7. If the coding method of item 9 of the scope of patent application is applied, the following steps are performed before performing the operation: Reconfiguring the second data element of the secondary data. 1 8. The coding method according to item 9 of the scope of patent application, wherein the main data is in the form of a primary data array containing a first data element and the secondary data is in the form of a secondary data array containing a second data element To represent, and includes the following steps: re-evaluate the size of the primary data array to match the secondary data array, and estimate the items in the French code that are in the new weight. The next column includes the fruit package, such as the main column, the short column, the main column, and the double column Wh. The items that are coded in French code are 9 11th. Fan Li specially invited the first technique in the first line and the first line in the field. It is necessary to have the master in addition to the new or heavy skills. One by one, the data should be rooted and included before, and the elements should be stepped on. These elements of the item number 9 of the first round of the second round of the standard replenishment and special allocation of new items, please reiterate the technical support 1 I 2 And France with a first resource in the first two packet count comprises per its PBC ^. And the calculation of the number of characters in the Yundai school is based on the element material data item 9 of the table. With 1 inclusive calculation " * 11 第31頁 452732 六、申請專利範圍 資料元素之間的邏輯運算。 2 3.如申請專利範圍第9項的編碼方法,其中第一與第二 資料元素以數字表示而每個運算為一對應函數。 2 4.如申請專利範圍第9項的編碼方法,其中第一與第二 資料元素以數字表示而每個運算為1:1對應函數,其中每 個第二資料元素的内容作為用於選擇第一資料元素的指標 而每個已選擇第一資料元素的内容指定為對應的金匙元 素。 其中運算是可使 1其中選擇可以 1其中選擇可以 包括儲存金匙元 1包括儲存關於 2 5 .如申請專利範圍第9項的編碼方法 用的而選擇可以經由運算決定。 2 6 .如申請專利範圍第2 5項的編碼方法 隨機地或擬隨機地決定。 2 7 .如申請專利範圍第2 5項的編碼方法 經由先前定義的方法決定。 2 8 .如申請專利範圍第9項的編碼方法 素於金匙檔案的步驟。 2 9 .如申請專利範圍第2 8項的編碼方法 編碼方法的資訊於金匙檔案之屬性區塊内的步驟。 3 〇 .如申請專利範圍第2 9項的編碼方法,其中儲存於屬 性區塊的資訊包括此運算或已執行的運算。 3 1 .如申請專利範圍第2 8項的編碼方法,包括儲存主要 資料於金匙檔案的步驟。 3 2.如申請專利範圍第9項的編碼方法,其中主要資料包 括經由如申請專利範圍第1項的方法產生的擬隨機數字序Page 31 452732 6. Scope of patent application Logical operation between data elements. 2 3. The coding method according to item 9 of the scope of patent application, wherein the first and second data elements are represented by numbers and each operation is a corresponding function. 2 4. The coding method of item 9 in the scope of the patent application, wherein the first and second data elements are represented by numbers and each operation is a 1: 1 correspondence function, wherein the content of each second data element is used to select the first An index of a data element and the content of each selected first data element is designated as a corresponding key element. Among them, the operation can be made 1 where the selection can be made 1 where the selection can include the storage of golden keys 1 including the storage of 2 5. As for the encoding method used in the 9th patent application, the selection can be determined by the operation. 26. The coding method as described in item 25 of the scope of patent application is randomly or quasi-randomly determined. 27. The encoding method as described in item 25 of the patent application scope is determined by the previously defined method. 2 8. The encoding method as described in item 9 of the patent application is the same as the key file file. 29. The coding method according to item 28 of the scope of patent application. The steps of coding method information in the attribute block of the key file. 30. The coding method of item 29 in the scope of patent application, wherein the information stored in the attribute block includes the operation or the operation performed. 3 1. The coding method according to item 28 of the patent application scope, including the step of storing the main data in a key file. 3 2. The coding method according to item 9 of the scope of patent application, wherein the main information includes a quasi-random number sequence generated by the method like item 1 of the scope of patent application 第32頁 45273£ 六、申請專利範圍 列。 3 3.如申請專利範圍第9項的編碼方法,其中主要資料包 括經由一隨機數字產生器產生的隨機數字序列。 3 4.如申請專利範圍第9項的編碼方法,其中主要資料由 網際網路獲得的檔案提供。 3 5 .如申請專利範圍第3 4項的編碼方法,包括下列步 驟: 儲存金匙元素於金匙檔案;以及 儲存關於網際網路檔案的資訊於金匙檔案的屬性區 塊。 3 6 .如申請專利範圍第9項的編碼方法,其中次要資料包 括一文字訊息而每個第二資料元素包括一來自符號集合的 符號。 3 7.如申請專利範圍第9項的編碼方法,其中第一資料元 素配置於陣列中而每個第一資料元素代表一相對數位音訊 取樣的特性。 3 8.如申請專利範圍第9項的編碼方法,其中第一資料元 素配置於陣列中而每個第一資料元素代表一相對靜態影像 元素的特性。 3 9.如申請專利範圍第9項的編碼方法,其中第一資料元 素配置於陣列中而每個第一資料元素代表一相對動態視訊 元素的特性。 4 0 . —種解碼次要資料的方法,包括第二資料元素,該 次要資料編碼於金匙元素使得每個金匙元素可以經由與相Page 32 45273 £ 6. Scope of patent application. 3 3. The coding method according to item 9 of the scope of patent application, wherein the main data includes a random number sequence generated by a random number generator. 3 4. The coding method according to item 9 of the scope of patent application, in which the main information is provided by files obtained from the Internet. 35. The encoding method according to item 34 of the patent application scope, including the following steps: storing the key element in the key file; and storing information about the Internet file in the attribute block of the key file. 36. The coding method according to item 9 of the scope of patent application, wherein the secondary data includes a text message and each second data element includes a symbol from a symbol set. 37. The coding method according to item 9 of the scope of patent application, wherein the first data element is arranged in an array and each first data element represents a characteristic of a relative digital audio sample. 38. The coding method according to item 9 of the scope of patent application, wherein the first data element is arranged in an array and each first data element represents a characteristic of a relatively still image element. 39. The coding method according to item 9 of the scope of patent application, wherein the first data element is arranged in an array and each first data element represents a characteristic of a relatively dynamic video element. 4 0. — A method for decoding secondary data, including a second data element, the secondary data is encoded in a key element so that each key element can be related to 第33頁 45273t 六、申請專利範圍 對的主要資料第一資料元素執行的運算產生,該方法包括 下列步驟: 提供該包括該已排列第一資料元素的主要資料; 提供該金匙元素,‘ 對於每個金匙元素,經由執行該反運算產生一對應的 該第二資料元素。 4 1 .如申請專利範圍第4 0項的方法,其中在次要資料編 瑪期間,在執行此運算之前根據一已定義技術重新配置第 一資料元素,在產生該第二資料元素之前,該方法包括下 列步驟: 根據該已定義技術重新配置主要資料的第一資料元 素。 4 2 .如申請專利範圍第4 1項的方法,其中金匙元素由一 有屬性區塊的金匙檔案提供,而此屬性區塊包含關於在次 要資料編碼期間該用於第一資料元素已定義技術的資訊, 該方法包括從屬性區塊讀出資訊以測定該已定義技術。 4 3.如申請專利範圍第4 0項的方法,其中在次要資料編 碼期間,主要資料重新估算大小以匹配次要資料大小,該 方法在產生該第·一資料元素之削包括根據在次要貢料編碼 期間執行的重新估算大小來重新估算主要資料大小。 4 4.如申請專利範圍第4 3項的方法,其中在次要資料編 碼期間,主要資料經由裁短主要資料重新估算大小如果次 要資料小於主要資料或重複主要資料如果次要資料大於主 要資料,該方法在產生第二資料之前包括下列步驟:45273t on page 33 6. The main data of the patent application scope is generated by the operation performed on the first data element. The method includes the following steps: providing the main data including the arranged first data element; providing the key element, 'for Each golden key element generates a corresponding second data element by performing the inverse operation. 41. The method of claim 40 in the scope of patent application, wherein during the compilation of the secondary data, before performing this operation, the first data element is reconfigured according to a defined technique, and before the second data element is generated, the The method includes the following steps: The first data element of the master data is reconfigured according to the defined technology. 42. The method according to item 41 of the scope of patent application, wherein the key element is provided by a key file with an attribute block, and this attribute block contains information about the data element to be used for the first data element during the encoding of the secondary data. Information of a defined technology, the method comprising reading information from an attribute block to determine the defined technology. 4 3. The method according to item 40 of the scope of patent application, wherein during the encoding of the secondary data, the size of the primary data is re-estimated to match the size of the secondary data. The re-estimated size performed during encoding is used to re-estimate the primary data size. 4 4. The method according to item 43 of the scope of patent application, in which the primary data is re-estimated by shortening the primary data during the encoding of the secondary data. , The method includes the following steps before generating the second data: 第34頁 ^273 六、申請專利範圍 如果在編碼期間裁短主要資料,根據在次要資料編碼 期間執行的截短指令戴短主要資料; 如果在編碼期間重複主要資料,根據在次要資料編碼 期間執行的重複指令重複主要資料。 4 5 .如申請專利範圍第4 4項的方法,其中在次要資料編 碼期間,主要資料的第一資料元素根據第一個技術重新配 置並根據該第一個技術或另外除了該第一個技術外的技術 重複第一資料元素,在產生該第二資料元素之前,該方法 包括根據該第一個技術重新配置主要資料的第一資料元素 與根據該第一個技術或該另外的技術重複第一資料元素的 步驟。 46.如申請專利範圍第40項的方法,其中金匙元素提供 於有屬性區塊的金匙檔案中而此屬性區塊包含在次要資料 編碼期間執行之運算的資訊,該方法包括從此屬性區塊讀 入該資訊以測定用於每個金匙元素的該反運算。 4 7.如申請專利範圍第4 0項的方法,其中在次要資料編 碼期間,主要資料是由來自網際網路獲得的檔案提供,而 金匙元素是由有包含關於網際網路檔案資訊之屬性區塊的 金匙檔案提供,該方法包括從屬性區塊讀入該資訊以擷取 該網際網路檔案。 4 8,如申請專利範圍第4 0項的方法,其中主要資料包括 由如申請專利範圍第1項產生的擬隨機數字序列。Page 34 ^ 273 VI. Scope of patent application If the main data is shortened during the coding period, the main data will be shortened according to the truncation instruction executed during the coding of the secondary data; if the main data is repeated during the coding period, the main data will be coded according to the secondary data. Repeated instructions executed during the period repeat the main data. 4 5. The method according to item 44 of the scope of patent application, wherein during the encoding of the secondary data, the first data element of the primary data is reconfigured according to the first technology and according to the first technology or in addition to the first The non-technical technology repeats the first data element. Before generating the second data element, the method includes reconfiguring the first data element of the main data according to the first technology and repeating the first data element according to the first technology or the other technology Steps for the first data element. 46. The method of claim 40, in which the key element is provided in a key file with an attribute block and the attribute block contains information about operations performed during the encoding of the secondary data, the method includes from this attribute The block reads this information to determine the inverse operation for each key element. 4 7. The method according to item 40 of the scope of patent application, wherein during the encoding of the secondary data, the main data is provided by a file obtained from the Internet, and the key element is provided by The key file of the attribute block is provided, and the method includes reading the information from the attribute block to retrieve the Internet file. 48 8. The method as claimed in item 40 of the scope of patent application, wherein the main information includes a quasi-random number sequence generated as in item 1 of the scope of patent application. 第35頁Page 35
TW088119232A 1998-10-28 1999-11-04 Methods of digital steganography for multimedia data TW452732B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
SG9803458 1998-10-28
MYPI9904276 1999-10-04
PCT/SG1999/000105 WO2000025203A1 (en) 1998-10-28 1999-10-26 Methods of digital steganography for multimedia data

Publications (1)

Publication Number Publication Date
TW452732B true TW452732B (en) 2001-09-01

Family

ID=26641542

Family Applications (1)

Application Number Title Priority Date Filing Date
TW088119232A TW452732B (en) 1998-10-28 1999-11-04 Methods of digital steganography for multimedia data

Country Status (1)

Country Link
TW (1) TW452732B (en)

Similar Documents

Publication Publication Date Title
Joshi et al. A new method of image steganography using 7th bit of a pixel as indicator by introducing the successive temporary pixel in the gray scale image
Artz Digital steganography: hiding data within data
JP5346024B2 (en) Content encryption
Popa An analysis of steganographic techniques
US7568100B1 (en) Steganographic method and device
US8271795B2 (en) Security based on subliminal and supraliminal channels for data objects
JP4669187B2 (en) Method for embedding a watermark in a compressed image, method for recovering a watermark from a compressed image, and recording medium
Moon et al. Data security using data hiding
Mandhani et al. Watermarking using decimal sequences
CN1890914B (en) Block ciphering system, using permutations to hide the core ciphering function of each encryption round
US20050154893A1 (en) Method for embedding codes, method and apparatus for restoring identification information
Alkhudaydi et al. Integrating light-weight cryptography with diacritics Arabic text steganography improved for practical security applications
WO2000025203A1 (en) Methods of digital steganography for multimedia data
Papapanagiotou et al. Alternatives for multimedia messaging system steganography
TW452732B (en) Methods of digital steganography for multimedia data
Geetha et al. Implementation of ETAS (embedding text in audio signal) model to ensure secrecy
Yadnya et al. Using Phase Coding Method for Audio Steganography with the Stream Cipher Encrypt Technique
Lalwani et al. Secure Data Hiding in Audio-Video Steganalysis by Anti-Forensic Technique
Bilan et al. Research of Methods of Steganographic Protection of Audio Information Based on Video Containers
Suhail et al. A new method for hiding a secret file in several WAV files depends on circular secret key
CA2319601A1 (en) Method and apparatus for camouflaging data
Rosalina et al. Implementation of Securing Data in the Cloud using Combined Cryptography and Steganography
Zumchak Audio steganography: A comparative study of techniques and tools
WO2009027902A2 (en) Apparatus and methods for transferring editable digital content
Dutta et al. A new type of audio steganography with increased privacy using different ratios of LSB embedding