Patent application number | Description | Published |
20100119126 | Method and System for Binarization of Biometric Data - Embodiments of the invention disclose a system and a method for transforming a biometric of a user to a binary feature vector suitable for user authentication, comprising steps of: partitioning the biometric into a set of regions, wherein each region is a contiguous region confining a part of the biometric; determining, for each region, biometric parameters; applying, to each region, binary logical conditions to produce at least one bit of the binary feature vector, wherein the applying is performed by a processer; and outputting the binary feature vector. | 05-13-2010 |
20100142004 | Method for Embedding a Message into a Document - A method that embeds a message into a document containing a number of glyphs and extracts said message from a degraded version of said document. Each symbol of the message is represented as a geometrical relationship of two discrete sets of pixels, in which the pixels in each set are adjacent. The pixels associated with the glyphs selected from the document are combined with the discrete sets of pixels to produce modified glyphs that contain the embedded message. | 06-10-2010 |
20100164984 | Method for Embedding Messages into Documents Using Distance Fields - A method embeds a message into a document containing a set of glyphs. Individual glyphs in the document, groups of glyphs in the document, or the entire document are represented using a distance field that includes distance values from the shapes of interest. Each symbol of the message is represented as modifications of a subset of the distance values in the distance field. This subset of the distance values in the distance field is modified according to modification to produce a modified glyph in a modified document, wherein the symbol in the message is embedded in the modified glyph. | 07-01-2010 |
20100185870 | Method and System for Managing a Hierarchy of Passwords - A method and system manage a hierarchy of passwords for users accessing a hierarchy of access control devices. First, a codeword is acquired and a syndrome of the codeword is determined. Next, the codeword is randomly modified with a probability p to produce a modified codeword. The modified codeword is selected and assigned to a user as a password, if the modified codeword is recoverable. | 07-22-2010 |
20100246812 | Secure Similarity Verification Between Encrypted Signals - A method for verifying a similarity between a first signal and a second signal is described. The first and the second signals are encrypted homomorphically using a key. First, we acquire a set of error patterns determined by a similarity constraint. Then, each error pattern is homomorphically encrypted using the key and presented to a verifier in the setup phase. The verifier declares the first signal similar to the second signal, if any error pattern in the set of error patterns satisfies a homomorphic relationship between the first encrypted signal and the second encrypted signal. | 09-30-2010 |
20110040820 | Secure Multi-Party Computation of Normalized Sum-Type Functions - Embodiments of present invention disclose a system and a method for determining a result of a function applied to a first vector and a second vector, wherein the function is a normalized sum-type function. The first vector is stored at a first processor, and the second vector is stored at a second processor. The system and the method determine a joint empirical probability distribution (JEPD) of the first vector and the second vector using a secure multi-party computation. The function is determined as a normalized summation of products of values of the JEPD with corresponding values of the function. | 02-17-2011 |
20110158464 | Method for Embedding Messages into Structure Shapes - Embodiments of the invention disclose a system and a method for embedding a symbol in a glyph, comprising the steps of determining a set of landmarks representing an outline of the glyph; determining a data segment between two landmarks, wherein the data segment is suitable for embedding the symbol; modifying the data segment according to the symbol to produce a modified glyph such that the symbol is embedded in the modified glyph; and outputting the modified glyph. | 06-30-2011 |
20110176672 | Method for Determining Functions Applied to Signals - Embodiments of the invention discloses a system and a method for determining a result of applying a function to signals including a first signal and a second signal, wherein the function is a polynomial function of the signals such that a monomial in the function includes the first signal having a power less than or equal to a first maximum power, and wherein the first signal is partitioned into a first subsignal and a second subsignal, comprising a processor for performing steps of the method, comprising the steps of acquiring a second signal and a second subsignal; acquiring a set of encrypted powers of the first subsignal, wherein the set of encrypted powers of the first subsignal includes homomorphically encrypted powers of the first subsignal; and determining an encrypted result of the function based on a second subsignal, the set of encrypted powers of the first subsignal, and the second signal. | 07-21-2011 |
20110194691 | Method for Privacy-Preserving Computation of Edit Distance of Symbol Sequences - Embodiments of the invention discloses a system and a method for determining an encrypted edit distance as an encryption of a minimum cost of transformation of a first sequence into a second sequence based on an insertion cost, a deletion cost, and a substitution cost. The method determines recursively a current element of the matrix as an encryption of a minimum of a first element, a second element, and a third element to produce the dynamic programming solution, wherein the first element represents the insertion cost, the second element represents the deletion cost, and the third element represents the substitution costs, and wherein the current element, the first element, the second element, and the third element are homomorphically encrypted with a public key; and selects the dynamic programming solution as the encrypted edit distance, wherein steps of the method are performed by a first processor and a second processor. | 08-11-2011 |
20120140829 | Signal Coding Using Spatial Statistical Dependencies - An encoded signal is decoded based on statistical dependencies between the encoded signal and the side information. A statistical reliability of each transform block of the side information is determined as a function of absolute values of transform coefficients of a transform block. The transform blocks of the side information are grouped into a set of groups based on the statistical reliability of each transform block. The decoding is performed using a statistical dependency between a transform block of the encoded signal and a group including a corresponding transform block of the side information. | 06-07-2012 |
20120230396 | Method for Embedding Decoding Information in Quantized Transform Coefficients - A method decodes a picture in a form of a bit-stream. The picture is encoded and represented by vectors of coefficients. Each coefficient is in a quantized form. A specific coefficient is selected in each vector based on a scan order of the vector. Then, a set of modes is inferred based on characteristics of the specific coefficient. Subsequently, the bit-stream is decoded according to the set of modes. | 09-13-2012 |
20120254605 | Privacy-Preserving Probabilistic Inference Based on Hidden Markov Models - Parameters of a hidden Markov model (HMM) are determined by a server based on an observation sequence stored at a client, wherein the client has a decryption key and an encryption key of an additively homomorphic cryptosystem, and the server has only the encryption key. The server initializes parameters of the HMM and updates the parameters iteratively until a difference between a probability of the observation sequence of a current iteration and a probability of the observation sequence of a previous iteration is above a threshold, wherein, for each iteration, the parameters are updated based on an encrypted conditional joint probability of each pair of states given the observation sequence and the parameters of the HMM, wherein the encrypted conditional probability is determining in an encrypted domain using a secure multiparty computation (SMC) between the server and the client. | 10-04-2012 |
20120254606 | Privacy-Preserving Probabilistic Inference Based on Hidden Markov Models - A most likely sequence of states corresponding to an observation sequence stored at a client is determined securely with respect to a HMM stored at a server. An encryption of a log-probability of the current element of the observation sequence is determined for each state of the HMM. A product of an encryption of the log-probability of the state for the current element, an encryption of a transition probability to the state, and the encryption of a log-probability of the current element of the observation sequence is determined iteratively, for each state of the HMM, to produce an encrypted matrix of indexes of the states; and the encrypted matrix is transmitted to the client. | 10-04-2012 |
20120254612 | Privacy-Preserving Probabilistic Inference Based on Hidden Markov Models - A probability of an observation sequence stored at a client is evaluated securely with respect to a hidden Markov model (HMM) stored at a server. The server determines, for each state of the HMM, an encryption of a log-probability of a current element of the observation sequence. Determines, for each state of the HMM, an encryption of a log-summation of a product of a likelihood of the observation sequence based on a previous element of the observation sequence and a transition probability to the state of the HMM. Determines an encryption of a log-likelihood of the observation sequence for each state as a product of the encryption of a log-summation and an encryption of a corresponding log-probability of the current element of the observation sequence; and determines an encryption of the log-probability of the observation sequence based on the log-likelihood of the observation sequence for each state. | 10-04-2012 |
20130051691 | Method for Distributed Source Coding of Wavelet Coefficients in Zerotrees - A method for encoding a source image, wherein the source image includes a set of bitplanes of pixels, is disclosed. For each bitplane in a most to least significant order, the method include obtaining a list of significant pixels (LSP), a list of insignificant pixels (LIP), and a list of insignificant sets (LIS) according to a hierarchical ordering of the source image pixels; synchronizing the LSP, LIP and LIS of the source image with the LSP, LIP and LIS of a key image; constructing a temporary list of insignificant sets (TLIS) for the source image; and applying syndrome encoding to the LSP, LIP, and TLIS of the source image to obtain syndromes corresponding to magnitudes and signs of pixels in the source image, wherein the steps are performed in a processor. | 02-28-2013 |
20130114811 | Method for Privacy Preserving Hashing of Signals with Binary Embeddings - A hash of signal is determining by dithering and scaling random projections of the signal. Then, the dithered and scaled random projections are quantized using a non-monotonic scalar quantizer to form the hash, and a privacy of the signal is preserved as long as parameters of the scaling, dithering and projections are only known by the determining and quantizing steps. | 05-09-2013 |
20130121405 | Method for Coding Signals with Universal Quantized Embeddings - Distances between data are encoded by per a random projection, followed by dithering and scaling, with a fixed scaling for all values. The resulting dithered and scaled projection is quantized using a non-monotonic 1-bit quantizer to form a vector of bits representing the signal. The distance between signals can be approximately calculated from the corresponding vectors of bits by computing the hamming distance of the two vectors of bits. The computation is approximately correct up to a specific distance, determined by the scaling, and not beyond that | 05-16-2013 |
20130336588 | Method for Representing Images Using Quantized Embeddings of Scale-Invariant Image Features - Scale-invariant features are extracted from an image. The features are projected to a lower dimensional random projection matrix by multiplying the features by a matrix of random entries. The matrix of random projections is quantized to produce a matrix of quantization indices, which form a query vector for searching a database of images to retrieve metadata related to the image. | 12-19-2013 |
20130339751 | Method for Querying Data in Privacy Preserving Manner Using Attributes - A client queries a set of encrypted data instances located at a server with a query attribute of the client. The set of encrypted data instances is associated with a set of ciphertexts, wherein a ciphertext is an encrypted function of a representation of a corresponding data instance and a data instance attribute extracted from the corresponding data instance. The client decrypts the ciphertext from the set of ciphertexts based on a distance function of the query attribute and the data instance attribute to produce the representation, and accesses the corresponding data instance using the representation. | 12-19-2013 |
20130339814 | Method for Processing Messages for Outsourced Storage and Outsourced Computation by Untrusted Third Parties - A message is stored and processed by an untrusted third party by generating a codeword using a selected one of a set of error correcting codes (ECC). The selected ECC depends on a weight rate of the block, and each codeword satisfies a minimum distance criterion with respect to the codewords of all possible ECCs and all possible weight rates. Each symbol of the codeword is modifying explicitly, randomly and independently according to parameters of a channel to obtain a randomized codeword. Then, an encoded result of an operation performed on the randomized codeword by the untrusted third party is decoded. | 12-19-2013 |
20130340098 | Method for Outsourcing Data for Secure Processing by Untrusted Third Parties - Data is generated in a client based on events at a client, wherein each event is associated with a first dimension, a second dimension and a quantity. A random value is generated for each interval of the first dimension and each instance of the second dimension. The quantity of each event is modified using the random value to determine a modified quantity. A running total for each interval of the first dimension and each instance of the second dimension is determined using the modified quantities and transmitted to an untrusted third party. An exact result of processing the modified quantities and the running totals by the untrusted third party can then be received and decoded by the client. | 12-19-2013 |
20140105385 | Method for Privacy-Preserving Order Selection of Encrypted Element - A system and a method select an encrypted element in an encrypted vector according to an order of the encrypted element in the encrypted vector. The selecting is performed in a privacy-preserving manner. Values of the elements of the encrypted vector are scaled, such that the order of the elements in the encrypted vector is preserved, and then permuted to produce a scaled permuted vector. Information in the encrypted domain indicative of an order of elements in the scaled permuted vector is provided to a second processor having a private key. The second processor decrypts the information to determine the index of the encrypted element based on the order of the elements. The encrypted element is obliviously selected based on the index. | 04-17-2014 |
20140137260 | Privacy Preserving Statistical Analysis for Distributed Databases - Aggregate statistics are determined by first randomizing independently data X and Y to obtain randomized data {circumflex over (X)} and Ŷ. The first randomizing preserves the privacy of the data X and Y. Then, the randomized data {circumflex over (X)} and Ŷ is randomized secondly to obtain randomized data {tilde over (X)} and {tilde over (Y)} for a server, and helper information T | 05-15-2014 |
20140219330 | Method and System for Encoding Collections of Images and Videos - An input segment of an input video is encoded by first extracting and storing, for each segment of previously encoded videos, a set of reference features. The set of input features are matched with each set of the reference features to produce a set of scores. The reference segments having largest scores are selected to produce a first reduced set of reference segments. A rate-distortion cost for each reference segment in the first reduced set of reference segments is estimated. The reference segments in the first reduced set of reference segments is selected to produce a second reduced set of reference segments. Then, the input segment are encoded based on second reduced set of reference segments. | 08-07-2014 |
20140281567 | Method for Authenticating an Encryption of Biometric Data - A method authenticates an encryption of a probe vector of biometric data based on an encryption of an enrolment vector of the biometric data using consistency of discriminative elements of the biometric data. The method determines an encryption of a first distance between discriminative elements of an enrolment vector stored at a server and a probe vector presented for an authentication. The method also determines an encryption of a second distance between discriminative elements of a first consistency vector stored at the server and a second consistency vector presented for the authentication. Next, the biometric data is authenticated based on encryptions of the first and the second distances. | 09-18-2014 |
20140281572 | Privacy Preserving Statistical Analysis on Distributed Databases - Aggregate statistics are securely determined on private data by first sampling independent first and second data at one or more clients to obtain sampled data, wherein a sampling parameter substantially smaller than a length of the data. The sampled data are encrypted to obtain encrypted data, which are then combined. The combined encrypted data are randomized to obtain randomized data. At an authorized third-party processor, a joint distribution of the first and second data is estimated from the randomized encrypted data, such that a differential privacy requirement of the first and second is satisfied. | 09-18-2014 |
20140331059 | Method and System for Authenticating Biometric Data - A method for authenticating biometric data determines a first set of descriptors of a fingerprint. Each descriptor in the first set represents a region of the fingerprint that includes multiple minutiae. The method compares each descriptor in the first set of descriptors with each descriptor in a second set of descriptors to determine a number of matching descriptors and compares the number of matching descriptors with a threshold for authenticating the biometric data. | 11-06-2014 |
20150085920 | Distributed Source Coding using Prediction Modes Obtained from Side Information - In a decoder, a desired image is estimated by first retrieving coding modes from an encoded side information image. For each bitplane in the encoded side information image, syndrome bits or parity bits are decoded to obtain an estimated bitplane of quantized transform coefficients of the desired image. A quantization and a transform are applied to a prediction residual obtained using the coding modes, wherein the decoding uses the quantized transform coefficients of the encoded side information image. The estimated bitplanes of quantized transform coefficients of the desired image are combined to produce combined bitplanes. Then, an inverse quantization, an inverse transform and a prediction based on the coding modes are applied to the combined bitplanes to recover the estimate of the desired image. | 03-26-2015 |
20150085923 | Method for Improving Compression Efficiency of Distributed Source Coding Using Intra-Band Information - In a decoder, a desired image is estimated by first retrieving coding modes from an encoded side information image. For each bitplane in the encoded side information image, syndrome bits or parity bits are decoded to obtain an estimated bitplane of quantized transform coefficients of the desired image. A quantization and a transform are applied to a prediction residual obtained using the coding modes, wherein the decoding uses the quantized transform coefficients of the encoded side information image, and is based on previously decoded bitplanes in a causal neighborhood. The estimated bitplanes of quantized transform coefficients of the desired image are combined to produce combined bitplanes. Then, an inverse quantization, an inverse transform and a prediction based on the coding modes are applied to the combined bitplanes to recover the estimate of the desired image. | 03-26-2015 |
20150134778 | Method for Determining Hidden States of Systems using Privacy-Preserving Distributed Data Analytics - A method classifies data to determine hidden states of a system, by first randomly permuting the data and inserting client to generate private data. A server classifies the private data according to a hidden Markov model (HMM) to obtain permuted noisy estimates of the states and the chaff, which are returned to the client. The client then removes the chaff, inverts the permuted noisy estimates to obtain unpermuted noisy estimates of the states. | 05-14-2015 |
20150199573 | Global Scene Descriptors for Matching Manhattan Scenes using Edge Maps Associated with Vanishing Points - A method constructs a descriptor for an image of a scene, wherein the descriptor is associated with a vanishing point in the image by first quantizing an angular region around the vanishing point into a preset number of angular quantization bins, and a centroid of each angular quantization bin indicates a direction of the angular quantization bin. For each angular quantization bin, a sum of magnitudes of pixel gradients for pixels in the image at which a direction of the pixel gradient is aligned with the direction of the angular quantization bin is determined, wherein the steps are performed in a processor. | 07-16-2015 |