Cryptography – Key management – Key distribution
Reexamination Certificate
2006-05-02
2006-05-02
Jung, David (Department: 2134)
Cryptography
Key management
Key distribution
C380S279000, C380S278000
Reexamination Certificate
active
07039192
ABSTRACT:
A method for embedding a message within a file may include generating a session key [305]and encrypting the session key with a public key to produce an encrypted session key [310]. The message may be encrypted with the session key to produce an encrypted message [320]. A random number generator may be seeded with the public key [335], and the encrypted session key may be embedded throughout the file in locations corresponding to random numbers produced by the random number generator [340]. The random number generator may be seeded with the session key [345], and the encrypted message may be embedded throughout the file in locations corresponding to random numbers produced by the random number generator after the seeding with the session key [355].
REFERENCES:
patent: 5822436 (1998-10-01), Rhoads
patent: 2001/0004736 (2001-06-01), Hirano et al.
An adaptive data hiding technique for binary images; Tung-Hsiang Liu; Long-Wen Chang; Pattern Recognition, 2004 ICPR 2004. Proccedings of the 17th International Conference on; Vol. 4, Aug. 23-26, 2004 Page(s):831-833 vol. 4.
Secure identity authentication and logical access control for airport information systems; David et al..; Security Technology, Proceedings. IEEE 37th Annual 2003 International Carnahan Conference on Oct. 14-16, 2003 Page(s): 314-320.
Safe primes density and cryptographic applications; Duran Diaz, R.; Monteya Vitini, F.; Munez Masque, J.; Security Technology, 1999. Proceedings. IEEE 33rd Annual 1999 International Carnahan Conference on Oct. 5-7, 1999 Page(s):363-367.
Provos, Niels et al., “Detecting Steganographic Content on the Internet,” CITI Technical Report 01-11, University of Michigan, Aug. 31, 2001, 13 pages.
Jung David
Suchtya, Esq. Leonard C.
Verizon Services Corp.
Wall, Esq. Joel
LandOfFree
Methods for data encryption using multiple layer steganography does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods for data encryption using multiple layer steganography, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods for data encryption using multiple layer steganography will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3525017