Skip To The Main Content

Browse these ideas available for licensing that have the potential to improve lives while creating jobs to support and grow the region.


All technologies
 are listed as non-confidential technical summaries.

Technologies were generated by academic institutions, entrepreneurs, and corporations.

Click the Tech Search button below to have Whiteboard 2 Boardroom® staff complete a personalized search for innovations to license from our research institution partners.

The most recent innovations from our partners are featured separately and organized by category. All listings are updated as new technology opportunities become available. 

For assistance in connecting with, or attaining further information on any of these technologies, please contact us.

Detector and Extractor of Fileprints

This high fidelity, robust, and easy-to-implement method for data protection and change detection uses naturally occurring digital watermarks - data fingerprinting, so there's no need to embed.

JWS-16
This method uses “naturally occurring digital watermarks” – the Detector and Extractor of Fileprints (DEF). This process allows for measuring the integrity and origins of a data sequence without the need to embed watermarks and unlike data hashing is amenable to similarity measurements. DEF is applicable to any binary data and can be thought of as a visual data hash, sometimes referred to as a data fingerprint. This efficient technique is especially suitable to files larger than 10,000 bytes.

BENEFITS:
  • High fidelity – No auxiliary data is embedded into the host data to be protected
  • Robust – Designed to survive common distortion procedures such as lossy compression, conversion between digital/analog format and copying by using spectral characteristics
  • Easy to implement – Key components of DEF are time-frequency representations and log-amplitude compression; these are well established techniques commonly found in signal processing systems. DEF is an extra computation step that can be easily accomplished in software languages such as Java or C++ or in hardware via FPGA or ASIC and brings significant improvements to the downstream detection and classification processes.

Additional Details

Owner

Department of Defense

Intellectual Property Protection

Patent Issued



Interested? Request More Information