scispace - formally typeset
Search or ask a question

Showing papers on "Cover (telecommunications) published in 2003"


Proceedings ArticleDOI
06 Jul 2003
TL;DR: The results, based on cover signals from a clean TIMIT utterance and a noisy aircraft cockpit utterance, show that the technique meets several major criteria for successful covert communication.
Abstract: A method of embedding a covert audio message in a cover utterance for secure communication is presented. The covert message is represented in a compressed form with possibly encryption and/or encoding for added security. One bit in each of the samples of a given cover utterance is altered in accordance with the data bits and a key. The same key is used to retrieve the embedded bits at the receiver. The results, based on cover signals from a clean TIMIT utterance and a noisy aircraft cockpit utterance, show that the technique meets several major criteria for successful covert communication.

191 citations


Journal ArticleDOI
TL;DR: Using general principles for developing steganalytic methods that can accurately estimate the number of changes to the cover image imposed during embedding, the secret message length is estimated for the most common embedding archetypes.
Abstract: The objective of steganalysis is to detect messages hidden in cover objects, such as digital images. In practice, the steganalyst is frequently interested in more than whether or not a secret message is present. The ultimate goal is to extract and decipher the secret message. However, in the absence of the knowledge of the stego technique and the stego and cipher keys, this task may be extremely time consuming or completely infeasible. Therefore, any additional information, such as the message length or its approximate placement in image features, could prove very valuable to the analyst. In this paper, we present general principles for developing steganalytic methods that can accurately estimate the number of changes to the cover image imposed during embedding. Using those principles, we show how to estimate the secret message length for the most common embedding archetypes, including the F5 and OutGuess algorithms for JPEG, EzStego algorithm with random straddling for palette images, and the classical LSB embedding with random straddling for uncompressed image formats. The paper concludes with an outline of ideas for future research such as estimating the steganographic capacity of embedding algorithms.

172 citations


Patent
Simon Wilson1
22 Apr 2003
TL;DR: A mobile telephone consisting of an engine assembly comprising a display and a plurality of switches, and a flexible cover overlying, without an intermediate rigid cover, and snugly fitting the engine assembly and comprising an aperture aligned with the display and an integrated keypad, is described in this article.
Abstract: A mobile telephone comprising : an engine assembly comprising a display and a plurality of switches; and a flexible cover overlying, without an intermediate rigid cover, and snugly fitting the engine assembly and comprising an aperture aligned with the display and an integrated keypad, for user input, aligned with the plurality of switches.

113 citations


Patent
26 Nov 2003
TL;DR: In this paper, a mobile communication device (200 ) having a functional cover ( 202 ) for controlling sound applications by means of measuring motion of said functional cover is described. But this is not the case in this paper.
Abstract: This invention relates to a mobile communication device ( 200 ) having a functional cover ( 202 ) for controlling sound applications by means of measuring motion of said functional cover ( 202 ). In particular, the present invention relates to a functional cover ( 202 ) for a mobile communication device ( 200 ) measuring motion and providing a control signal to the mobile communication device ( 200 ) in accordance herewith.

77 citations


Patent
Michael Josenhans1, A. Ahland1
12 Jun 2003
TL;DR: In this article, a mobile communication device cover comprising a keyboard and a cover processor is presented, which is characterized by a bus interface for connecting the cover processor to the mobile communication module, wherein the bus interface is adapted to operate with a plurality of mobile communication modules.
Abstract: A portable radio communication device has an exchangeable cover. Specifically the invention relates to a system of a mobile phone to provide multiple functionality and user interoperability to a mobile terminal device. The present invention provides a mobile communication device cover comprising a keyboard and a cover processor. The keyboard and the cover processor are interconnected. The cover is characterized by a bus interface, for connecting the cover processor to a mobile communication module, wherein the bus interface is adapted to operate with a plurality of mobile communication modules.

56 citations


Patent
31 Jan 2003
TL;DR: In this paper, the authors proposed a means for network sharing in the multioperator mobile networks, and the object of the present invention is to cover different sharing constellations, despite the high amount of different sharing alternatives, they are not contradicting each other but are only options for different sharing needs.
Abstract: The objective of the present invention is to provide a means for network sharing in the multioperator mobile networks. Furthermore, the object of the present invention is to cover different sharing constellations. Despite the high amount of different sharing alternatives of the present invention, they are not contradicting each other but are only options for different sharing needs.

35 citations


Proceedings ArticleDOI
08 Mar 2003
TL;DR: The results of embedding a covert audio message in a cover audio signal for battlefield communication using steganography are presented, and the hidden message can be made further secure from unauthorized detection and modification by incorporating spread-spectrum techniques.
Abstract: 0-7803-7651-X/03/$17.00 © 2003 IEEE IEEEAC paper #1027, Updated November, 2002 Abstract --This paper presents the results of embedding a covert audio message in a cover audio signal for battlefield communication using steganography. Representing the covert message in a compressed or coded form, typically in the standard Global System for Mobile communication halfrate code (GSM 06.20), tones are added to the cover utterance in accordance with the coded bits. Based on the psychoacoustical masking property of the human auditory system, the added tones are set at very low power levels relative to the cover audio frames. The low power levels ensure that the tones are inaudible in the message-embedded stego signal. Besides imperceptibility in hearing, the spectrogram of the stego signal also conceals the existence of embedded information. Both of these features render the detection of embedding in the stego signal difficult to accomplish. Oblivious detection of the stego signal, instead of escrow detection, yields the embedded information accurately. By incorporating spread-spectrum techniques, the hidden message can be made further secure from unauthorized detection and modification. While the payload capacity of the proposed technique is low, the embedded information may be robust for retaining data under attack.

34 citations


Patent
07 Oct 2003
TL;DR: In this paper, an apparatus for creating a framework for the creation, editing, signing and signature verification of multiple documents includes a master, or cover, document as a holder and display source for the subdocuments created within the cover document.
Abstract: An apparatus for creating a framework for the creation, editing, signing and signature verification of multiple documents includes a master, or cover, document as a holder and display source for the subdocuments created within the cover document. The cover document is protected against direct modification with the possible exception of the addition of comments that do not affect digital signatures in the cover document. Access to the subdocuments for editing, signature generation and signature verification is through a menu associated with the cover document. A method of creating a hierarchy of approval signatures on the cover document encompassing subdocuments and nested approval signatures is described.

33 citations


Patent
04 Jun 2003
TL;DR: In this paper, a transponder circuit is mounted in an automobile, and a cover is provided that coordinates with the automobile in accordance with at least one predetermined criterion, and the cover is engaged to the trans-ponder housing whereby the cover and trans-pin cable are affixed to one another.
Abstract: A combination for use in a motor vehicle comprises a sealed housing containing a transponder circuit suitable for interacting with an automated toll gate system, a cover that coordinates with the motor vehicle in accordance with at least one prescribed criterion, and an engagement means affixed to the cover and configured for engaging the transponder housing such that the housing and cover are affixed to one another. A method for mounting such a transponder within an automobile is provided in which a cover is provided that coordinates with the automobile in accordance with at least one predetermined criterion, the cover is engaged to the transponder housing whereby the cover and transponder housing are affixed to one another, a location in the automobile is selected for mounting the transponder, and the cover and transponder are mounted to the automobile in a single action.

32 citations


Book ChapterDOI
01 Jan 2003
TL;DR: This chapter shows what possibilities an unfriendly intruder has and which leaks DRM systems must close in consequence.
Abstract: DRM systems are insecure. This statement seems to be too simple. But like all simplifications it has a true background: Every piece of software is breakable. This chapter shows what possibilities an unfriendly intruder has and which leaks DRM systems must close in consequence. We cover audio and video protection mechanisms as well as eBooks.

32 citations


Patent
12 Feb 2003
TL;DR: In this article, a wireless communication terminal has a user exchangeable cover part, which is electrically interconnected by means of an electrical connector and comprises identification means, identification means and an electric circuitry for supporting a user interface.
Abstract: A wireless communication terminal has a user exchangeable cover part The wireless communication terminal and user exchangeable cover part are electrically interconnected by means of an electrical connector The user exchangeable cover part comprises identification means The user exchangeable cover part has an electric circuitry for supporting a user interface of the wireless terminal The wireless terminal identifies the user exchangeable cover part by detecting the identification means The wireless terminal operates the electric circuitry of the user exchangeable cover part independently of the identification of user exchangeable cover part

Patent
04 Dec 2003
TL;DR: In this paper, an apparatus for protecting an accessory connector (12) on a communication device can include an opening (14) for providing access to the connector, and the apparatus can be a cover (16) attached in a tethered relation to the communication device.
Abstract: An apparatus for protecting an accessory connector (12) on a communication device (10). The communication device can include an opening (14) for providing access to the connector. The apparatus can be a cover (16) attached in a tethered relation to the communication device. A portion of the cover can be flexible so as to allow a user to selectively move the cover between a first position and a second position. In the first position, at the cover can substantially close the opening such that the connector is substantially protected from the infiltration of solid particles and the gross intrusion of liquids. In the second position, the cover can be held away from the connector such that substantially unimpeded access to the connector is permitted. The cover and communication device can have various associated features to ensure that the cover is retained in the first and second positions.

Journal ArticleDOI
Yu Chen Hu1
TL;DR: A novel image hiding scheme capable of hiding multiplegrey-level images into another grey-level cover image using the greedy least significant bit substitution technique is proposed.
Abstract: A novel image hiding scheme capable of hiding multiple grey-level images into another grey-level cover image is proposed. To reduce the volume of secret images to be embedded, the vector quantisation scheme is employed to encode the secret images. The compressed message is then encrypted by the DES cryptosystem to ensure security. Finally, the encrypted message is hidden into the cover image using the greedy least significant bit substitution technique.

Patent
03 Jun 2003
TL;DR: In this paper, a cover for a hitch receiver includes a removable cover plate, which may incorporate a theft deterrent design and may be illuminated by an electroluminescent sheet.
Abstract: A cover for a hitch receiver includes a removable cover plate, which may incorporate a theft deterrent design and may be illuminated by an electroluminescent sheet.

Patent
05 Dec 2003
TL;DR: In this paper, an example firearm with a dust cover to cover the opening in the housing, the dust cover being pivotable between an open position and a closed position, and a magnetic lock to secure the cover in the closed position is presented.
Abstract: Methods and apparatus to lock a dust cover in a firearm housing are disclosed. An example firearm disclosed herein comprises a housing constructed substantially from non-magnetic material and defining an opening; a dust cover to cover the opening in the housing, the dust cover being pivotable between an open position and a closed position; and a magnetic lock to secure the dust cover in the closed position.

Patent
24 Jul 2003
TL;DR: In this article, an electrical cover plate, a cover that slides in slots in the cover plate and a slide plate with male engagement fingers that lock or hold the cover securely in place was presented.
Abstract: The protective electrical outlet device of the present invention is directed to an electrical cover plate, a cover that slides in slots in the cover plate, and a slide plate with male engagement fingers that lock or hold the cover securely in place.

Patent
10 Jun 2003
TL;DR: In this article, a cover assembly for a food processor having a cover cooperative with a working bowl or container, an accessory being selectively cooperative with at least one cavity in the cover, a safety system including a disengaging assembly cooperative with the cover and/or the accessory to selectively deactivate or disengage the safety system.
Abstract: A cover assembly for a food processor having a cover cooperative with a working bowl or container, an accessory being selectively cooperative with at least one cavity in the cover, a safety system including a disengaging assembly cooperative with the cover and/or the accessory to selectively deactivate or disengage the safety system. The cover and the accessory can be simultaneously separated and/or removed from the food processor or adjusted relative to each other and/or the food processor.

Patent
04 Jun 2003
TL;DR: In this paper, a multi-part message decoding system and methods are described, which comprises a container having an openable orifice on a portion of the container and a cover piece removeably coupled over the orifice, where the cover piece has a first portion of a message on an unexposed side thereof.
Abstract: Multi-part message decoding systems and methods are disclosed herein. In one embodiment, a decoding system comprises a container having an openable orifice on a portion of the container. In addition, the system comprises a cover piece removeably coupled over the orifice, where the cover piece has a first portion of a message on an unexposed side thereof. The decoding system still further comprises a message component having a second portion of a message, where the cover piece is affixable to the message component to combine the first and second portions to complete the message.

Patent
08 Jul 2003
TL;DR: In this paper, a cellular phone includes a housing and a cover detachably installed on the housing, the cover containing an ID module for identifying the cover and the transceiver containing a detection port for communicating with the ID module of the cover.
Abstract: A cellular phone includes a housing and a cover detachably installed on the housing, the cover containing an ID module for identifying the cover. The cellular phone also contains a transceiver for controlling operation of the cellular phone, the transceiver containing a detection port for communicating with the ID module of the cover and determining identification of the cover, a memory electrically connected to the transceiver, and a database stored in the memory for providing operation parameters to the transceiver according to the identification of the cover.

Patent
06 Aug 2003
TL;DR: A weather screen is a cover having a handle and a flexible material that is secured to the cover by a user to support the cover away from the user's head, and preferably above the user head as discussed by the authors.
Abstract: A weather screen includes a cover having a handle and a flexible material that is secured to the cover. The handle of the cover is grasped by a user to support the cover away, and preferably above, the user's head. The material extends downwardly or hangs from the cover such that the user is enclosed or surrounded by the material.

Journal ArticleDOI
TL;DR: Two new (2, n) ASS schemes are proposed, which carefully employ the technique of time division with only one cover sound and have the advantage of flexible improvement in relative contrast as needed.
Abstract: An Audio Secret Sharing (ASS) scheme is a special type of secret sharing scheme [3], which the shares of embedded messages use music as cover sound. Desmedt et al. firstly introduced the (2, 2) ASS scheme with one cover sound and also the generalized (2, n) ASS scheme with [log2n] different cover sounds. No only will more cover sounds overburden the human hearing system but also may become difficult for people to distinguish the secret bit correctly. Thus, their scheme is not practical when n is large. In this paper, we will propose two new (2, n) ASS schemes, which carefully employ the technique of time division with only one cover sound. Comparing with the first scheme, the second scheme has the advantage of flexible improvement in relative contrast as needed. To test the acoustic result, we implemented these two proposed (2, n) ASS schemes for small n using one wave-type cover sound and then obtained near expected results.

Patent
Wolfgang Kaczmarek1
04 Dec 2003
TL;DR: In this article, a domestic appliance consisting of at least one optical operation indicator, which can be covered by a cover element, is configured in such a way that its light route (27, 27') can be adapted to the thickness of the cover element (3, 9).
Abstract: The invention relates to a domestic appliance (1), in particular a built-in domestic appliance comprising at least one optical operation indicator (10), which can be covered by at least one cover element (3, 9), at least one fibre optic (12, 23) being coupled to the optical operation indicator (10) for transmitting at least one emitted light signal (11). The aim of the invention is to improve the visibility of the light signal of the operation indicator(s) (10). To achieve this, the fibre optic (12, 23) is configured in such a way that its light route (27, 27') can be adapted to the thickness of the cover element (3, 9).

Proceedings Article
01 Jan 2003
TL;DR: The goal is to devise a system that can cover the entire road network of the US, and the proposed architecture for the system is described, and it is evaluated using a micro-traffic simulator and a calibrated model of the South Jersey transportation network.
Abstract: Traffic congestion has become a part of daily life of most of us. One possible way of preventing congestion from building up is by disseminating traffic information. Today a number of commercial solutions exist for disseminating traffic information (e.g., Traffic.com, Metrocommute, EtakTraffic). However, these solutions are plagued by prohibitive deployment and maintenance cost that prevents widespread deployment. As a result, these solutions cover select highways while leaving out major fractions of the highways. In this paper we present our vision of a low cost, highly scalable zero-infrastructure system for collecting and disseminating information about traffic conditions. Our goal is to devise a system that can cover the entire road network of the US. We describe the proposed architecture for the system, and evaluate it using a micro-traffic simulator and a calibrated model of the South Jersey transportation network.

Patent
05 Feb 2003
TL;DR: A card holder for an information bearing card which has an information-bearing sensitive area and a non-sensitive area is described in this article, where the card holder has a cover attachable to the card so as to cover the sensitive area.
Abstract: A card holder for an information bearing card which has an information-bearing sensitive area and a non-sensitive area. The card holder has a cover attachable to the card so as to cover the sensitive area. The inner side of the cover, which faces the card when the cover is attached to the card, has at least one raised portion such that, when the cover is attached to the card with the inner side facing the sensitive area, the raised portion maintains the cover at a stand off from the sensitive area. The card holder also has an attaching member mounted on the cover for attaching the cover to the card.

Patent
Liang-Fang Chen1
07 Sep 2003
TL;DR: In this article, a wireless communication device includes an inner housing and a cover detachably installed on the inner housing, the cover containing an ID module for identifying the cover, and a multi-band transceiver for processing transmitted and received wireless signals in one of a plurality of frequency bands.
Abstract: A wireless communication device includes an inner housing and a cover detachably installed on the inner housing, the cover containing an ID module for identifying the cover. A multi-band transceiver is disposed on the inner housing for processing transmitted and received wireless signals in one of a plurality of frequency bands. A detection circuit is disposed on the inner housing for communicating with the ID module of the cover and determining identification of the cover. The wireless communication device also contains a memory electrically connected to the multi-band transceiver and a database stored in the memory for providing a frequency band identifier to the multi-band transceiver according to the identification of the cover provided by the detection circuit for changing the frequency band of the multi-band transceiver.

Patent
15 Jul 2003
TL;DR: In this paper, a transceiver and a cover detachably installed on the transceiver module are used for portable communications devices, where the cover contains magnetic media disposed on the cover, the magnetic media emitting a magnetic flux for identifying the cover.
Abstract: A portable communications device includes a transceiver module and a cover detachably installed on the transceiver module. The cover contains magnetic media disposed on the cover, the magnetic media emitting a magnetic flux for identifying the cover. The transceiver module includes a magnetic sensor for measuring the magnetic flux emitted by the magnetic media and generating a corresponding output signal and a control circuit for receiving the output signal from the magnetic sensor and determining an identification of the cover based on the received output signal.

Patent
27 Feb 2003
TL;DR: A dust cover for a computer keyboard has a rectangular plastic body and two cords and can fit any computer keyboard and provide a convenient and reliable way to press keys on the keyboard while simultaneously protecting the keyboard from pathogens and other contaminants.
Abstract: A dust cover for a computer keyboard has a rectangular plastic body and two cords. The dust cover can fit any computer keyboard and provide a convenient and reliable way to press keys on the keyboard while simultaneously protecting the keyboard from pathogens and other contaminants.

Patent
Jan Brandt1
29 Jan 2003
TL;DR: In this article, a cover member for an electronic device is defined, and the circuitry of the electronic device can supplement the RFID module, enabling storage, display, and control transactions enabled by the secure frequency identification (RFID) module.
Abstract: A cover member for an electronic device (Fig. 1). The cover member (26) having a secure frequency identification (RFID) module (28) within it, and an electronic device (14) inclduing such a cover member, and a system (10) including such an elecrtronic device for authorizing providing of goods or services. If desired, the circuitry of the elctronic device (32,34,36) can supplement the RFID module, enable storage, display and control transactions enabled by the RFID module.

Journal ArticleDOI
TL;DR: An algorithm that uses the LSB and those inhomogeneous areas of the cover image to hide a message and error correction code is used to increase the probability of retrieving the message and the receiver will be able to detect if there is any alterations in the cover Media.
Abstract: Steganography is the art of hiding a message in a secret way that only the receiver of the cover media knows the existence of the message. This secret message must be unobserved by a human eyes, Studies have shown that Human Vision Systems (HVS) is unable to detect changes in uncorrelated areas of the digital media, due to the complexity of such areas, where it is easy to detect changes in correlated areas. Security and quality are two important issues of steganography . In this paper we wil l introduce an algorithm that uses the LSB and those inhomogeneous areas of the cover image to hide a message. In this algorithm error correction code is used to increase the probability of retrieving the message, as well as the receiver will be able to detect if there is any alterations in the cover Media, in this case the receiver Informs the sender about this alterations.

Patent
24 Sep 2003
TL;DR: In this paper, the back cover is removed or detached from the cell phone to expose a mirror, which can then be attached back to the phone or otherwise secured or left unsecured so that the user can use the mirror.
Abstract: A cell phone includes a separate back cover containing a mirror. The back cover is removed or detached from the cell phone to expose a mirror. The back cover can then be attached back to the cell phone or otherwise secured or it can be left unsecured so that the user can use the mirror. Once the user is finished using the mirror, the back cover is secured to the cell phone, thereby protecting the mirror from any possible damage.