Enveloping for Cloud Computing via Wavefront Muxing

ABSTRACT

Data files with digital envelops may be used for many new applications for cloud computing. The new applications include games and entertainments such as digital fortune cookies, and treasure hunting, unique techniques for digital right management, or even additional privacy and survivability on data storage and transport on cloud computing. Wavefront multiplexing/demultiplexing process (WF muxing/demuxing) embodying an architecture that utilizes multi-dimensional waveforms has found applications in data storage and transport on cloud. Multiple data sets are preprocessed by WF muxing before stored/transported. WF muxed data is aggregated data from multiple data sets that have been “customized processed” and disassembled into any scalable number of sets of processed data, with each set being stored on a storage site. The original data is reassembled via WF demuxing after retrieving a lesser but scalable number of WF muxed data sets. A customized set of WF muxing on multiple digital files as inputs including at least a data message file and a selected digital envelop file, is configured to guarantee at least one of the multiple outputs comprising a weighted sum of all inputs with an appearance to human natural sensors substantially identical to the appearance of the selected digital envelop in a same image, video or audio format. Enveloping processing is a subset of WF muxing processing. The output file is the file with enveloped or embedded messages. The embedded message may be reconstituted by a corresponding WF demuxing processor at destination with the known a priori information of the original digital envelope. In short, digital enveloping/de-enveloping can be implemented via WF muxing and demuxing formulations. WF muxed data featured enhanced privacy and redundancy in data transport and storage on cloud. On the other hand, data enveloping is an application in an opposite direction for conventional WF muxing applications as far as redundancy is concerned. Enveloped data are intended only for limited receivers who has access to associated digital envelope data files with enhanced privacy for no or minimized redundancy.

RELATED APPLICATIONS

This application claims the benefit of U.S. provisional application Ser.No. 62/038,767, entitled “Enveloping and De-enveloping for CloudComputing via WF Muxing,” filed Aug. 18, 2014. This application is alsorelated to a non-provisional application Ser. No. 12/848,953, filed onAug. 2, 2012, a non-provisional application Ser. No. 13/938,268, filedon Jul. 10, 2013, and a non-provisional application Ser. No. 13/953,715,filed on Jul. 29, 2013, all of which are incorporated herein byreference in their entireties.

BACKGROUND OF THE DISCLOSURE Field of the Disclosure

The disclosure relates to methods and architectures of packing orenveloping data for cloud storage and transport using Wavefrontmultiplexing (WF muxing). It is focused to appearance of datapackage/envelop and reliability of enclosed data.

According mailonline (http://www.dailymail.co.uk) on Aug. 31, 2014,naked images of high-profile actors, models, singers and presenters havebeen leaked online in an apparent hacking leak linked to the AppleiCloud service. The photos appeared after a user on 4chan, an imagesharing forum, posted private pictures of 101 celebrities includingJennifer Lawrence, Ariana Grande, Victoria Justice and Kate Upton. Theimages, which were posted on Sunday night, were reportedly accessed dueto au iCloud leak_that enabled celebrities' phones to be hacked. Applehas declined to comment. Privacy of the celebrities were terriblyviolated.

There are needs for better privacy protection on cloud. Envelopingtechniques will enhance privacy protection on cloud.

WF muxing techniques have been presented extensively in the abovementioned US patent application Ser. Nos. 12/848,953, 13/938,268,13/953,715. The WF muxing techniques will use less memory space toachieve better redundancy, reliability, and survivability as compared toconventional techniques. In addition, these techniques enablecapabilities of monitoring integrity of stored data sets withoutscrutinizing the stored data sets themselves. The same techniques can beextended to data streaming via cloud.

There are two more concerns. Many operators offer secured and encryptedstorage services. However, secured files are only encrypted on theserver side and therefore a client has to rely on honesty of the serveroperator. The second is concerns about the right of stored data; whichare under debate.

This invention application addresses enhanced privacy, and reliabilityof data transports and stored data on cloud. Many of the data may evenbe image or audio related. Since multiple data sets to be transported orstored will be preprocessed on client sides, each of the transported orstored data on cloud is a multiplexed (muxed) data set individuallywhich is unintelligible by itself. Therefore, the proposed approachesshall remove the concerns on professional integrity confidence ofoperators, and those on the right of stored data. Known images, audiotracks, or multimedia streams may all be used as digital “envelopes” forcloud data storage and transport. Most applications are aiming for gamesand entertainments in cloud communications. It may be applied as toolsfor various digital right management on copy right, protecting IPholders. Authentications with known “chokes or stamps” via thesetechniques for multilayer enveloping will be one highlight of thispatent application.

Digital images will be used to exemplify the digitalenveloping/de-enveloping techniques in this patent application. Othertypes of digital streams may be easily incorporated for the proposedenveloping techniques.

Embodiments of “writing” and “reading” processes will be summarized andpresented concisely. “Writing” features a process on multiple originalimages concurrently via WF muxing transformations, generating WF muxeddata to be stored on cloud. A “reading” process corresponds to a WFdemuxing transformation on WF muxed data stored on cloud, reconstitutingoriginal data sets. The enveloping is a subset of “writing” proceduresunder constraints that enveloped messages, or products of the writingprocedures, shall preserve some desired features in digital appearance,and the de-enveloping is a subset of reading procedures to reconstituteembedded mails from the enveloped messages.

Enveloping processing is a subset of WF muxing processing. A customizedset of WF muxing on multiple digital files as inputs including at leasta data message file and a selected digital envelop file, is configuredto guarantee at least one of the multiple outputs comprising a weightedsum of all inputs with an appearance substantially identical to theappearance of the selected digital envelop in a same image, video oraudio format, as far as to human natural sensors are concerned. Theoutput file is the file with enveloped or embedded messages. Theembedded message may be reconstituted by a corresponding WF demuxingprocessor at destination with the known a priori information of theoriginal digital envelope.

In short, digital enveloping/de-enveloping can be implemented via WFmuxing and demuxing formulations. WF muxed data featured enhancedprivacy and redundancy in data transport and storage on cloud. On theother hand, data enveloping is an application in an opposite directionfor most of the WF muxing applications as far as redundancy isconcerned. Enveloped data are intended only for limited receivers whohas access to associated digital envelope data files with enhancedprivacy for no or minimized redundancy.

SUMMARY OF THE DISCLOSURE

Wavefront multiplexing/demultiplexing (WF muxing/demuxing) processfeatures an algorithm invented by Spatial Digital Systems (SDS) forsatellite communications where transmissions demand a high degree ofpower combining, security, reliability, and optimization. WFmuxing/demuxing, embodying an architecture that utilizesmulti-dimensional transmissions, has found applications in fields beyondthe satellite communication domain. One such application is datatransport/storage on cloud where privacy, data integrity, and redundancyare important. Enveloping and de-enveloping on digital data may be usedfor both data transport and data storage. They may be used for gifts andgames such as digital fortune cookies. We will use data transport, suchas delivering mails, to exemplify the concept of enveloping andde-enveloping digital data.

This invention is about to send not all but a portion of WF muxed datastrings through cloud to destinations. An enveloped data streams are WFmuxed with a known data files as an envelope which may be a sender'spersonal picture indicating who is sending the enveloped (embedded) datastring. Different envelops may feature various pictures of sender'sindicating sender's mood while sending the enveloped data. The digitalenvelopes may be an old digital video clip for delivering new digitaldata streams for communications among family members only. All familymembers shall have access to the original old video clip.

WF muxing/demuxing for enveloping are configured to use additional knowndigital data streams for probing, authentications and identifications. Amethod for enveloping and then storing data in IP cloud comprises:transforming multiple first data sets into multiple enveloped seconddata sets at a transmitting side, wherein one of said enveloped seconddata sets comprises a weighted sum of said first data sets; storing saidenveloped second data sets in an IP cloud via an internet; and storingmultiple links linking to said enveloped second data sets at saidtransmitting side.

A data processing method comprises: transforming multiple first datasets and a known data set into multiple enveloped second data sets at atransmitting side, wherein one of said enveloped second data setscomprises a weighted sum of said first data sets; and recovering a thirddata sets from some of said enveloped second data sets and said knowndata set at a receiving side, wherein one of said third data setscomprises a weighted sum of said some of said enveloped second datasets.

A method for storing data in IP cloud, comprises: transforming multiplefirst data sets into multiple enveloped second data sets at atransmitting side, wherein one of said enveloped second data setscomprises a weighted sum of said first data sets and carries an imagewith intensities mainly controlled by one of said first data sets.

BRIEF DESCRIPTION OF THE DRAWINGS

The drawings disclose illustrative embodiments of the presentdisclosure. They do not set forth all embodiments. Other embodiments maybe used in addition or instead. Details that may be apparent orunnecessary may be omitted to save space or for more effectiveillustration. Conversely, some embodiments may be practiced without allof the details that are disclosed. When the same reference number orreference indicator appears in different drawings, it may refer to thesame or like components or steps.

Aspects of the disclosure may be more fully understood from thefollowing description when read together with the accompanying drawings,which are to be regarded as illustrative in nature, and not as limiting.The drawings are not necessarily to scale, emphasis instead being placedon the principles of the disclosure.

FIG. 1 depicts a block diagram on “sealing” a digital envelope for anembedded digital file via a 2-to-2 WF muxing processor by a sender at asource, sending only one of the two outputs as the digitally envelopeddata to a destination via cloud, and opening the digital envelop andrecovering the embedded data in accordance to some embodiments of thisinvention. The digital envelope is chosen by the sender from one of theknown candidate digital envelopes to both the sender at the source andthe receiver at the destination. The sealing and opening process for anenvelope are also referred as enveloping and de-enveloping,respectively.

FIG. 1A depicts a set of 6 candidate digital envelopes according toembodiments of this invention.

FIG. 1B depicts another set of 5 candidate digital envelopes accordingto embodiments of this invention.

FIG. 2 depicts a replicates of the FIG. 5D in U.S. patent applicationSer. No. 13/953,715; published with a PA publication No. US 2014-0081989A1; demonstrating computer simulated results of Camouflaging. The fourimages are inputs to a 4-to-4 WF muxing processor. The running horse waschosen as the digital camouflaging image. Effectively, the four imageson the second rows are enveloped data sets, according to someembodiments of this invention.

FIG. 3 depicts a block diagram on enveloping/de-enveloping via a 2-to-2Wavefront muxing techniques when a receiver in a destination does nothave access to original digital envelope according to some embodimentsof this invention. It is similar to the one in FIG. 1. The senders sendboth outputs to a receiver for recovering the original digital envelopand embedded information data via a WF demuxing processor as a postprocessor.

FIG. 4 illustrates a block diagram of double enveloping in accordance tosome embodiments of this invention.

FIG. 5 illustrates block diagram of double de-enveloping in accordanceto some embodiments of this invention.

FIG. 6 illustrates a block diagram of enveloping via higher order WFmuxing for one enveloped digital stream carrying embedded informationdata in accordance to some embodiments of this invention.

FIG. 7 illustrates a block diagram of de-enveloping via higher order WFde-muxing from one enveloped digital stream carrying embeddedinformation data in accordance to some embodiments of this invention.

FIG. 8 illustrates a block diagram of enveloping via higher order WFmuxing for two enveloped streams carrying embedded information data inaccordance to some embodiments of this invention.

FIG. 9 illustrates a block diagram of de-enveloping via higher order WFde-muxing from two enveloped digital streams in accordance to someembodiments of this invention.

FIG. 10 illustrates a block diagram of enveloping via a 4-to-4 WF muxingfor sending three of the 4 available enveloped streams carrying embeddedinformation data via cloud in accordance to some embodiments of thisinvention.

FIG. 11 illustrates a block diagram of de-enveloping via a 4-to-4 WFde-muxing from any two of three enveloped digital streams on cloud inaccordance to some embodiments of this invention.

FIG. 12 illustrates another block diagram of de-enveloping via a 4-to-4WF de-muxing from any two of three enveloped digital streams on cloud inaccordance to some embodiments of this invention.

FIG. 13 illustrates a block diagram of de-enveloping via a 4-to-4 WFde-muxing from all three enveloped digital streams on cloud inaccordance to some embodiments of this invention.

FIG. 14 illustrates another block diagram of de-enveloping via a 4-to-4WF de-muxing from all three enveloped digital streams on cloud inaccordance to some embodiments of this invention.

FIG. 15 illustrates a block diagram of double enveloping via a 4-to-4 WFmuxing and a 2-to-2 WF muxing to form one enveloped digital streams oncloud in accordance to some embodiments of this invention.

FIG. 16 illustrates a block diagram of double de-enveloping via a 2-to-2WF de-muxing and a 4-to-4 WF demuxing from one enveloped digital streamson cloud in accordance to some embodiments of this invention.

DETAILED DESCRIPTION OF THE INVENTION

The present invention relates to distributed transport paths or storagewith built-in redundancy via an M-to-M wavefront multiplexing (WFmuxing) techniques; where M≧2 and must be an integer. The M inputs tothe WF muxing comprising N streams of information data with additionalM-N known data files; where N≧1 and is an integer. The M independentinput data streams are transformed and concurrently converted into WFmuxed domain with M output wavefront components (wfcs). Only M′ of the Moutputs will be used for data transport and/or data storage on cloud,where M-N≦M′≦M; where M′ is an integer.

Furthermore, any one of the known data files may be chosen to serve as adigital transporting envelop and will be processed accordingly in anenveloping process as a part of the M-to-M WF muxing.

Multiple inputs to an M-to-M WF muxing processor are properly“emphasized” or “weighted” so that at least one of the M outputs will beselected to be a “carrier” for transporting embedded message. A selected“carrier”, an enveloped data file, shall appear substantially identicalto the appearance of the selected digital envelop to human sensors. Theidentical appearance comprises unique and easily distinguishablefeatures from other digital data files. These features may be visualpictures, videos, audio music, word files, or multimedia files

At least one of the enveloped data streams will be sent to a destinationvia cloud. An enveloped data stream may appear as a digital picture, avideo clip, a music clip, an audio recording, or a digital cartoon whilebeing transported or stored on cloud. Just as functions of regularenvelops, these digital envelops may convey context and authors of theembedded mail, a preview of intentions and moods of the author, and orinformation of where the embedded mail coming from.

The digital envelop and the enveloped digital data stream shall havesubstantially identical features which are identifiable anddistinguishable by human sensors; hearing, visually or both.

At destination, a desired receiver shall reconstitute the embeddedinformation data by a post processing such as wavefront demultiplexing(WF demuxing) with the help of accessing the known file of the originaldigital envelop.

The present invention discloses operation concepts, methods andimplementations of enveloping/de-enveloping via wavefront multiplexingfor cloud transport as depicted in FIG. 1. Similar techniques can beapplied to video streaming, secured data storage services, secured filetransfers, and other applications via Internet Clouds. The embodimentsof present inventions comprise three important segments including (1)the pre-processing for enclosing a mail in a selected envelope, i.e. theabove WF muxing, at a user end; (2) transporting embedded mails viaenveloped digital streams on cloud, and (3) a post-processing ofretrieval or de-enveloping, i.e. the above WF demuxing, at the user end.We will use a single user for both pre-processing and a post-processingas an example for illustrating the operation concepts.

In principle, the pre-processing and the post-processing are allperformed in user segments and performed in equipment at the user end.For cloud storage, these enveloping/de-enveloping may also be performedin storage facilities of an operator. The operator will aggregate thedata storage sets in cloud distributed over remote networks.

Embodiment 1

FIG. 1 depicts an operation concept of communications between a senderat a source and a receiver at a destination. The sender takes advantagesof a 2-to-2 WF muxing processor 130 for sealing or enveloping a set ofinput data S(t) by a selected digital envelope E5(t). The input data isan English phrase “Open Sesame” and its Chinese translation in a wordformat written in 4 Chinese characters and associated pronunciationsymbols. The chosen digital envelope is a digital picture of a famouspainting of “a running horse” by a Chinese painter, Xu Beihong, in early1900's. There are 11 digital envelopes 180 commonly known to a usercommunity which both the sender and the receiver belong to. There aretwo outputs from the WF muxer 130; one is for the enveloped mail Es(t),and the other is grounded. The Es(t) is a result of pixel-by-pixelprocessing from the two inputs data files; S(t) and E5(t). The WF muxingfeatures a 2*2 Hadamard transform. S(t) and E5(t) will be “scaled”properly to enable Es(t) appearance substantially identical to that inE5(t); as discussed extensively in the US patent application publicationno. 2014/0081989A1. In this case, the running horse in Es(t) appears tobe a flipped image of the same house in E5(t).

After the WF muxing, Es(t) is an enveloped data stream, and is the onlyfile to be sent to a destination via IP networks 010. Es(t) featureswith a visual appearance nearly identical to the picture of the famousrunning horse in E5(t). At the destination, a receive can reconstitutethe embedded message of “Open Sesame” written in Chinese via a 2*2 WFdemuxer 140 or an equivalent post processor; only when the digitalpicture of the original envelop is available to the receiver. There arethree segments including (1) a pre-processing 130, (2) IP propagationChannel 010, and (3) post processing 140 at downstream of the cloud.

Pre-Storage Processing 130:

In the pre-processing for mail enveloping, an 2-to-2 WF muxer 130 isused to convert 1 set of input mail data S(t) and a selected digitalenvelop string E5(t) to two output data strings, i.e. Es(t), and Ed(t),where:

Es(t)=S(t)+am*E5(t)  (1-1)

Ed(t)=−S(t)+am*E5(t),  (1-2)

-   -   Where am>>1 is a magnification factor, and image dependent,        usually set between 5 and 30.

A 2-to-2 Hadamard matrix (HM), in which all elements are “1” or “−1”only, is chosen for the 8-to-8 WF muxing. Equations (1-1) to (1-2) canbe written in a matrix form as

$\begin{matrix}{O = {{HM}*I}} & (2) \\{{{Where}\text{:}\mspace{14mu} O} = {\left\lbrack {{O\; 1},{O\; 2}} \right\rbrack^{T} = \left\lbrack {{{Es}(t)},{{Ed}(t)}} \right\rbrack^{T}}} & \left( {2\text{-}1} \right) \\{{HM} = \begin{bmatrix}1 & 1 \\{- 1} & 1\end{bmatrix}} & \left( {2\text{-}2} \right) \\{I = {\left\lbrack {{I\; 1},{I\; 2}} \right\rbrack^{T} = \left\lbrack {{S(t)},{{am}*E\; 5(t)}} \right\rbrack^{T}}} & \left( {2\text{-}3} \right)\end{matrix}$

The input ports of a WF muxer are referred to as slices, and its outputports are wavefront components (wfc's). The two input data sets S1 andam*E5, are connected to the input ports, i.e. slice 1, and slice 2 ofthe WF muxer respectively. The 2 output data sets i.e. O1-O2, areconnected to the output ports, i.e. wfc1-wfc2, of the WF muxer 130respectively.

In general a 2-to-2 WF muxing processor features 2 orthogonal wavefrontvectors or WFV's. Let us define a coefficient wjk of a WF transformationto be the coefficient at the j^(th) row and k^(th) column of the WFmuxer 130. A WF vector of the WF muxer 130 featuring a distributionamong the 2 outputs, i.e. O1-O2 at the 2 WF component ports wfc1-wfc2,is defined as a 2-dimensional vector. They are mutually orthogonal. Thetwo WFVs of the WF muxer 101 are:

WFV1=[w11,w21]^(T)=[1,−1]^(T)  (3.1)

WFV2=[w12,w22]^(T)=[1,1]^(T)  (3.2)

S(t), and E5(t) are “attached” to the 2 WF vectors by respectivelyconnected to the two input ports of the WF muxing device 130. Allcomponents of the 2 orthogonal WFVs are related to input and output portnumbers or (spatial) sequences, but are independent from the input andoutput data sets.

The arithmetic operations of “linear combinations” may operate on blocksof data after all inputs are aligned as digital streamssample-after-sample for various inputs. A “byte” of data may be“selected” as a sample and a block of X samples, i.e. 7 samples or 7bytes, of a digital data stream will be treated as a numerical numberfor calculations in WF muxing transformations. Two streams of 7 samplesor bytes may be the respective inputs of the 2-to-2 WF muxer. A blocksize of X+1 samples, i.e. 8 samples or 8 bytes in this case, will bereserved for the results of arithmetic operations on a number of thedigital streams to avoid issues of overflows and underflows at the twooutputs of the WF muxing transformations. There shall be 12.5% in datasize overhead of the 7 byte arithmetic operations, with respect to theresults in 8 byte forms in the outputs. In different embodiments, we maychoose blocks with a block length of 99 bytes for arithmetic operation,i.e. X=99, reducing the operation overhead to 1%.

There are other choices in selecting data blocks for arithmeticoperations of linear combinations or weighted sums in the WF muxingtransformations. For imaging processing, a pixel by pixel as operationblocks may be more important preserving unique features for someapplications, or a row or a column of pixels as a data block forefficient usage of storages.

In this example, only one of the two outputs will be delivered to adestination. The intended receiver must have “additional information” inorder to reconstitute the embedded message or mail; “Open Sesame” andits Chinese translation in a word format written in 4 ChineseCharacters. The additional information is the original file of theselected digital envelop. If both outputs were delivered to thereceiver, both the embedded mail and the selected original digitalenvelop could all be reconstituted independently at the destinationwithout any additional a priori known information.

In general at least one of WF muxed output streams from higher ordermuxing or multilayer enveloping will be sent to the destination 140 viaIP cloud 010. The embedded mail is in the enveloped digital data stream.The higher order muxing is usually referred to an N-to-N WF muxing withN in between 4 and 5000. The numbers of WF muxed streams to be sent to adestination shall be always smaller than a critical numbers of muxeddata streams; Ncr. There are not enough information in the Ncrindependent muxed data streams to reconstitute the embedded informationwithout any additional information known a priori.

Cloud 010:

Only one WF muxed file is sent from a source to a destination via thecloud 010. The original digital envelope file is known a priori to boththe sender at a source and receiver at the destination. Therefore therequired channel bandwidth for Es(t) is about the same as that of theembedded message, S(t). The differentials in required bandwidths betweenthat for Es(t) and that for S(t) are due to processing overhead.

Post Processing 140:

The post processing 140 for data retrieval comprises a WF demuxingprocessor, converting the received WF muxed data into an output ofembedded data file. The original digital envelope file, E5(t), is alsoused as one of the inputs to the WF demuxing in the post processing. Thereceived WF muxed data is substantially equivalent to the correspondingoutput data set, Es(t), of the WF muxing device in the preprocessing130, if not contaminated, and is therefore represented by Es(t) orEs'(t). Similarly, the recovered embedded data file is substantiallyequivalent to the input data sets, S(t), and is therefore referred to asS(t) or S′(t).

According to equation (1-1); the recovered embedded data can be derivedfrom the received WF muxed data Es(t) and the digital envelope E5(t);

S(t)=Es(t)−am*E5(t)  (4)

Where am can be experimentally optimized or through a priori knowledgeset. Therefore, the missing second output of the WF muxing can also bere-constructed in the destination according to Equation (1-2) andEquation (4)

Ed(t)=−Es(t)+2*am*E5(t),  (5)

A 2-to-2 Hadamard matrix with scaling factor of ½ may be chosen as the2-to-2 WF demuxer. The matrix elements of 2-to-2 Hadamard matrix feature“1” or “−1” only. The relationship may be written in a matrix form as

SM=HM*D  (6)

Where:

D=[D1,D2]=[Es(t),Ed(t)]^(T)  (6-1)

SM=[S(t),amE5(t)]^(T)  (6-2)

-   -   HM is a 2-to-2 Hadamard matrix in equation (2-2).

The input ports of a WF demuxer in the post processor 140 are referredto as wavefront components (wfcs), i.e. wfc1, and wfc2, and its outputports are slices, i.e. slice1, and slice2. In this example, the 2 inputdata sets, i.e. Es(t) and Ed(t), are connected to its input portswfc1-wfc2 of the WF demuxer 140, respectively. The retrieved data set,S1, is from its first output ports. Normally the second output of thedemuxing device 140 will be “grounded” for this application.

As an option, the respective second output from the WF demuxing device140 may be used to reconstitute a copy of the original digital envelopwhich will be compared to the known digital envelope file for theintegrity of received data. It is a good indication that the receivedembedded data has been compromised only if a set of comparison resultsshowing the two digital envelopes are different digital files.

FIG. 1A and FIG. 1B depict candidates for 6 and 5 digital envelopes,respectively. E5(t) is chosen for the example in FIG. 1. Ell in FIG. 1Bis a category of common known digital files between a sender and areceiver for private communications between them.

FIG. 2 is a replica of FIG. 5D in the U.S. patent application Ser. No.13/953,715 with a publication No. 20140081989. It illustrates an exampleof WF muxing/demuxing as pre-processing and post processing for a datastorage application on cloud, presenting image storage/retrievals via4-to-4 wavefront muxing on distributed cloud storages. The WFmuxing/demuxing may be via orthogonal matrixes or non-orthogonalmatrixes, as long as their inverse matrixes exist. It depicts theoriginal inputs in the first row 521, stored images or imagesto-be-transported in wavefront muxed formats in the second row 522, andreconstituted and recovered images at a destination in the third row523. The four pictures on the top row 521 are four input images; 3photos token recently at Bronx Zoo in city of New York, and the 4^(th)one is an image of a classic painting, “a running horse”, by a famousChinese painter Mr. Xu. Beihong in 1930's. The first, the second and thethird photos depict, respectively, a picture of an “Eagle” indicated asA1.png, a picture of a “Tiger” indicated as A2.png, and a picture of a“white head animal” indicated as A3.png. The “horse” is depicted asA4.png. They are all in PNG formats.

Let us assume a 4-to-4 Hadamard transform as WF muxing matrix.

The 4 WF muxed files Ov, Ox, Oy and Oz are in the second row 522. Tocreate various camouflaged effects on the WE muxed data for storage; theoriginal images have been “heavily weighted” for the “horse” painting.In order to assure that the A1 image of the Chinese horse painting to bemore dominant features in the 4 multiplexed outputs as camouflaged, wehave emphasized the pixel intensities of A1 via:

$\begin{matrix}{\begin{bmatrix}{O\; 1} \\{O\; 2} \\{O\; 3} \\{O\; 4}\end{bmatrix} = {\begin{bmatrix}{+ 1} & {+ 1} & {+ 1} & {+ 1} \\{+ 1} & {- 1} & {+ 1} & {- 1} \\{+ 1} & {+ 1} & {- 1} & {- 1} \\{+ 1} & {- 1} & {- 1} & {+ 1}\end{bmatrix}\begin{bmatrix}{{am}*A\; 1} \\{A\; 2} \\{A\; 3} \\{A\; 4}\end{bmatrix}}} & (7)\end{matrix}$

Where am>1. Usually am is set to be greater than 10. It is also assumedthe dimensions of pixel lattices among the 4 input images have beenfully equalized. Depending on the selection of a camouflaging image, theemphasizing factor, am, may applied to any of the input images in ∥A∥.Furthermore, equation (7) may also be written equivalently as:

$\begin{matrix}{\begin{bmatrix}{O\; 1} \\{O\; 2} \\{O\; 3} \\{O\; 4}\end{bmatrix} = {\begin{bmatrix}{+ {am}} & {+ 1} & {+ 1} & {+ 1} \\{+ {am}} & {- 1} & {+ 1} & {- 1} \\{+ {am}} & {+ 1} & {- 1} & {- 1} \\{+ {am}} & {- 1} & {- 1} & {+ 1}\end{bmatrix}\begin{bmatrix}{A\; 1} \\{A\; 2} \\{A\; 3} \\{A\; 4}\end{bmatrix}}} & \left( {7\text{-}1} \right)\end{matrix}$

As a result, the image of “horse” painted by Xu Baihong becomes dominantamong the 4 participating images and appears on all 4 WF muxed data,i.e. Ov, Ox, Oy and Oz, with appearances of various intensity settings.

Additional processing is required before the WF muxing to “flip, rotate,zone-in or zone-out” images or appearances on the WF muxed files withrespect to the appearance of the digital envelope.

Each of the WF muxed data sets Ov, Ox, Oy and Oz features a size about 2to 3 times larger than those of the original images A1-A4 or recoveredimages Sv, Sx, Sy and Sz to avoid overflow and underflow in thesimulations.

The images on the third row are restructured images via a readingprocess. A “reading” processing also features two steps. The first stepinvolves retrieving all 4 WF muxed files individually from cloud. Thesecond step involves via a wavefront demultiplexing transformation,converting the 4 WF muxed files, i.e. Ov, Ox, Oy and Oz, in ∥O∥ intofour recovered or reconstituted equalized files Sv, Sx, Sy and Sz in ∥S∥substantially equivalent to the four equalized pictures A1-A4respectively if the WF muxed files, i.e. Ov, Ox, Oy and Oz, are notcontaminated. The four recovered or reconstituted equalized image filesmay then be converted via a de-equalizing process into four recovered orreconstituted image files Sv, Sx, Sy and Sz substantially equivalent tothe four original pictures A1-A4 respectively.

Assuming all four files Ov, Ox, Oy and Oz are available, the WF demuxingtransformation (WF demuxing) shall follow:

∥S∥=∥WDmx∥∥O∥.  (8)

Where, ∥WDmx∥∥WMux∥=∥I∥.  (8-1)

More explicitly, “intensities” of individual pixels, in the lattice ofthe same row and column, of the 4 reconstituted images in Sv, Sx, Sy andSz in ∥S∥ are 4 respective linear combinations, each of which is alinear combination of intensities of individual pixels, in the latticeof the same row and column, of the four WF muxed files, i.e. Ov, Ox, Oyand Oz, in ∥O∥, multiplied by four respective weighting parameters in∥WDmx∥. For example, “intensities” of individual pixels, in the latticeof the 41^(th) row and 51^(th) column, of the 4 reconstituted orrecovered images in Sv, Sx, Sy and Sz in ∥S∥ are 4 respective linearcombinations of intensities of each individual pixels, in the lattice ofthe 41^(th) row and 51^(th) column, of the four WF muxed files, i.e. Ov,Ox, Oy and Oz, in ∥O∥, multiplied by four respective weightingparameters in ∥WDmx∥.

For applications of enveloping, only one of the 4 WF muxed files is sentto a destination from a sender at a source via cloud instead of sendingall 4 WF muxed files to cloud. As an example. A1 is the information datato be delivered to a destination via cloud and A4 is a selected digitalenvelope file. A2, A3 and A4 are known a priori to both the sender and adesired receiver at the destination.

Any one of the 4 files on the second row 522 can be used to convey theembedded message A1 via cloud. Let us select Ov as the enveloped datafile to be transported to destinations. It is clear that the image onenveloped data file, Ov, is a running horse which is substantiallyidentical to the running horse image on the enveloping file, A4. Theenveloped file, Oy, comprising information of the embedded message, A1,is the one to be sent to destinations via cloud.

We will not repeat all mathematical details on the Figure here. Inshort, we utilize the same mathematical manipulations for “enveloping”digital messages or embedding mails for cloud transport as those in“camouflaging” pictures in the above mentioned patent application. Wewant to show two important features of WF muxing/demuxing in theenveloping/de-enveloping applications. For an enveloping processing by aselected digital envelope (A4);

-   -   1) selected message (A1) are embedded in a selected enveloped        data set (Ov),    -   2) To human sensors, the original digital envelope (A4) and the        enveloped data set (Ov) shall appear substantially identical,        and distinguishable from other digital data sets (A2, A3 and A1)        clearly.    -   3) A2 and A3 may serve for purpose of authentication or        identifications

In another scenario, where A1 is the data set to be sent to adestination via cloud, A2 and A3 for authentication, and A4 as aselected digital envelope, Ov and Oz are sent to cloud. At thedestination, a first reader has all three digital data file A2, A3, andA4, and only needs to access 1 of the 2 enveloped data files on cloud;Ov or Oz to recover the embedded images, Sv. It is important to noticethat there is redundancy in wavefront multiplexed images as far as thefirst reader is concerned. On the other hand, a second reader does nothave the digital “horse” A4 but has original digital files for both A2and A3 and he must download both of two enveloped data files Ov and Ozsent via cloud in order to recover a the embedded image, A1. It is alsoimportant to notice that the second reader has the capability to capturethe file of the digital envelope A4 for later usage.

For a third scenario, where A1, A2, and A3 are the data sets to be sentto a destination via cloud, and A4 as a selected digital envelope, Ov,Ox, and Oz are sent to cloud. At the destination, a first reader hasonly has a digital data file A4, and needs to access all 3 envelopeddata files on cloud; Ov, Ox, and Oz to recover the embedded images, Sv.It is important to notice that there is no redundancy in wavefrontmultiplexed images as far as the first reader is concerned. On the otherhand, a second reader does not have the digital “horse” A4 and he maydownload all two enveloped data files Ov, Ox and Oz sent via cloud, buthe will not be able to reconstitute the embedded image, A1.

For a fourth scenario, where A1, A2, and A3 are the data sets to be sentto a destination via cloud, and A4 as a selected digital envelope, Ov,Ox, Oy, and Oz are sent to cloud. At the destination, a first reader hasonly has a digital data file A4, and needs to access any 3 of the 4enveloped data files on cloud; Ov, Ox, Oy, and Oz to recover theembedded images, Sv. It is important to notice that there is redundancyin wavefront multiplexed images as far as the first reader is concerned.On the other hand, a second reader does not have the digital “horse” A4and he must download all four enveloped data files Ov, Ox Oy, and Ozsent via cloud, in order to reconstitute the embedded image, A1. Thereis no redundancy in wavefront multiplexed images as far as the secondreader is concerned.

Embodiment 2

FIG. 3 depicts an operation concept of using the above WF multiplexingtechniques for 2 enveloped messages. There are three segments: (1) apre-processing or enveloping 130, (2) transported via cloud 010, and (3)post processing or de-enveloping 140. It is nearly identical to the oneshown in FIG. 1. FIG. 3 features a technique to send a digital data setand an original envelope to a desired receiver. Both outputs of thepre-processor 130, Es(t) and Ed(t) are sent to the receiver.

A message are embedded in the 2 enveloped data file Es(t) and Ed(t) aresent from a sender at a source to a receiver at a destination. Thereceiver utilizes both enveloped data sets to recover the embeddedmessage and the original digital envelop which may be used forsubsequent transmissions between the sender and the receiver. Once thedigital envelop data becomes known to both sides of a cloud basedcommunication channel, only one of the two WF muxed files either ES(t)or Ed(t) will be sent to cloud.

FIG. 3 features a technique to send a digital data set and an originaldigital envelope data set to a desired receiver. Both outputs of thepre-processor 130, Es(t) and Ed(t) are sent to the receiver forreconstituting both the embedded data, and the original digital data ofthe digital envelope.

Embodiment 3

FIG. 4 depicts a transmitting (Tx) operation concept of doubleenveloping using 2-to-2 WF multiplexing for enveloping a message dataset via two envelopes sequentially. It depicts first two of the threesegments in FIG. 1: (1) a pre-processing or enveloping 130, (2)transported via cloud 010, and (3) post processing or de-enveloping 140.

There are two enveloping processing in series in FIG. 4. Each one isidentical to the enveloping shown in FIG. 1. In the first pre-processing130-1, there are two inputs; S(t) and E1(t), and one output x(t). Thesecond output is grounded. S(t) comprises of a phrase of “Open Sesame”and its Chinese translation, and is the message to be delivered todestinations via cloud. E1(t) is a selected inner envelope and is one ofthe candidate envelopes 180. The first output x(t) features anappearance substantially identical to human sensors as that in E1(t).The second output is grounded.

In the second preprocessing 130-2, there are also two inputs, x(t) andE5(t), and only one output Es(t). E5(t) is a selected outer envelope andis also one of the candidate envelopes 180. The first output Es(t)features an appearance substantially identical to human sensors as thatin E5(t).

There is no appearance of a phrase of “Open Sesame” and its Chinesetranslation in Es(t). The required bandwidth for transporting the Es(t)shall be near identical to that of sending S(t) via cloud when theenveloping files, E1(t) or E5(t) are properly chosen.

In other embodiments, images in the enveloping files may have beenprocessed for various purposes such as minimized dynamic range ofindividual pixels or simply for enhanced authentication andidentifications before WF muxing. Many can be pre-stored in the envelopcandidate files as optional candidates. Certainly, these additionalprocessing can be included as a part of the pre-processing 130 inFIG. 1. It may also be implemented for double enveloping in either 130-1or 130-2 blocks or both in FIG. 4.

FIG. 5 depicts a receiving (Rx) operation concept of de-envelopingdoubly enveloped messages using 2-to-2 WF demultiplexing techniques forde-enveloping a message data set via two envelopes sequentially. Itdepict the last two of the three segments in FIG. 1; (1) apre-processing or enveloping 140, (2) transported via cloud 010, and (3)post processing or de-enveloping 140.

There are two de-enveloping processing in series. Each one is identicalto the de-enveloping shown in FIG. 1. In the first post-processing 140-1to open the outer envelope, there are two inputs; Es(t) and E5(t), andone output x(t). The second output is grounded. Es(t) is the receiveddigital data file with embedded message for the receiver in thedestination. E5(t) is a selected outer envelope and is one of thecandidate envelopes in a candidate file 180 known priori to both thesender and the receiver.

The first input Es(t) is a received data file in a desired receiver at adestination, and shall be substantially equivalent to the only output ofthe second pre-processing 130-2 in FIG. 4. In addition it shall featurean appearance substantially identical to human sensors as those inE5(t). Similarly, the first output x(t) of the first post processor140-1 features an appearance substantially identical to human sensors asthose in E1(t). The second output is grounded. In the secondpost-processing 140-2, there are also two inputs, x(t) and E1(t), andonly one output S(t). E1(t) is the selected inner envelope and is one ofthe candidate envelopes in the candidate file 180. The first output isthe recovered embedded message which shall read as “open sesame” and itsChinese translation in 4 Chinese characters.

Embodiment 4

FIG. 6 depicts a transmitting (Tx) operation concept of enveloping usinghigher order WF multiplexing techniques for enveloping a message dataset. A higher order WF muxing is referred to M-to-M WF muxing; where Mis an integer and 4. We use a 4-to-4 WF muxing to exemplify operationconcepts. The three grouped segments for enveloping and de-envelopingare identical to the ones shown in FIG. 1. It depicts first two of thefollowing three segments: (1) a pre-processing or enveloping 630, (2)transported via cloud 010, and (3) post processing or de-enveloping 640.

A 4-to-4 WF muxing is implemented in the pre-processing 630. There arefour inputs connected to S(t), E10(t), E1(t), and E5(t), and only oneoutput used for Ex(t). The remaining three outputs of the WF muxing aregrounded. S(t) comprises of a phrase of “Open Sesame” and its Chinesetranslation by 4 Chinese characters, and is the message to be deliveredto destinations via cloud. E5(t) is the selected envelope and is one ofthe candidate envelopes in the candidate file 180. The first outputEx(t) features an appearance substantially identical to human sensors asthose in E5(t). The second and the third inputs E10(t) and E1(t) arealso in the file 180 for candidate envelopes known a priori to both thesender and the receiver.

The mathematic derivations are identical to the ones for FIG. 2 when weuse a 4-to-4 Hadamard matrix for both the WF muxing and demuxing. The4-to-4 WF muxing in the preprocessing 630 is formulated based onEquation (7) as;

$\begin{matrix}{\begin{bmatrix}{{Ex}(t)} \\{O\; 2} \\{O\; 3} \\{O\; 4}\end{bmatrix} = {\begin{bmatrix}{+ 1} & {+ 1} & {+ 1} & {+ 1} \\{+ 1} & {- 1} & {+ 1} & {- 1} \\{+ 1} & {+ 1} & {- 1} & {- 1} \\{+ 1} & {- 1} & {- 1} & {+ 1}\end{bmatrix}\begin{bmatrix}{{am}*E\; 5(t)} \\{E\; 1(t)} \\{E\; 10(t)} \\{S(t)}\end{bmatrix}}} & \left( {7\text{-}2} \right)\end{matrix}$

The first output O1 is name ex(t), the other 3 outputs are grounded inFIG. 6. The scaling factor am is set to ˜10, so that the Ex(t) appearssubstantially identical to the appearance of E5(t) to human sensors.Ex(t) is to be delivered to destinations via cloud 010.

FIG. 7 is a block diagram of de-enveloping in a destination; reverseprocessing of those in FIG. 6. It depicts a receiving (Rx) operationconcept of de-enveloping using higher order WF de-multiplexingtechniques for de-enveloping a message data set. A higher order WFdemuxing is referred to M-to-M WF demuxing; where M is an integer and≧4. The three segments for enveloping and de-enveloping are identical tothe ones shown in FIG. 1; (1) a pre-processing or enveloping 630, (2)transported via cloud 010, and (3) post processing or de-enveloping 640.It depicts last two of the three segments.

Only one of the four WF muxed data set was sent to a destination viacloud 010. The required communication channel bandwidth may be nearlyidentical to that of S(t) signal itself, when the digital envelope, E5,is properly chosen and further optimized in pre-processing 630accordingly.

In the post-processing 640 a 4-to-4 WF demuxing is incorporated. Thereare four inputs; (1) Ex(t) the only received data set, (2) E10(t) aknown digital data in the envelop candidate file, (3) E1(t) a secondknown digital data in the envelop candidate file, and (4) E5(t) a knowndigital data for the selected digital envelop. Based on Equation (7-2);

Ex(t)=am*E5(t)+E1(t)+E10(t)+S(t)  (8)

And S(t)=Ex(t)−(am*E5(t)+E1(t)+E10(t))  (8-1)

Only one received enveloped file Ex(t) is used in Equation (8-1). Thesecond, the third, and the four inputs of the 4-to-4 WF demuxing areknown data sets. The recovered S(t) from the WF demuxing shall be theembedded message delivered and shall comprise of the phrase of “OpenSesame” and its Chinese translation by 4 Chinese characters.

Furthermore according to Equation (7-2), O2, O3, and O4 can now bereconstructed based on the recovered Ex(t). The restructured O2, O3, andO4 may be used for enhanced identifications.

Embodiment 5

FIG. 8 and FIG. 9 depict the enveloping and de-enveloping using higherorder WF muxing and demuxing. Two of the four outputs from a 4-to-4 WFmuxing are used as enveloped data sets to be sent to destinations viacloud 010.

FIG. 8 depicts a transmitting (Tx) operation concept of enveloping usinghigher order WF multiplexing techniques for enveloping a message dataset. We use a 4-to-4 WF muxing to exemplify operation concepts. Thethree grouped segments for enveloping and de-enveloping are identical tothe ones shown in FIG. 1. It depicts first two of the following threesegments: (1) a pre-processing or enveloping 630, (2) transported viacloud 010, and (3) post processing or de-enveloping 640.

A 4-to-4 WF muxing is implemented in the pre-processing 630. There arefour inputs connected to S(t), E10(t), E1(t), and E5(t), and only twooutputs used for Ex(t) and Ey(t). The remaining two outputs of the WFmuxing are grounded. S(t) comprises of a phrase of “Open Sesame” and itsChinese translation by 4 Chinese characters, and is the message to bedelivered to destinations via cloud. E5(t) is the selected envelope andis one of the candidate envelopes in the candidate file 180. As to thefirst output Ex(t) and the third output Ey(t), each features anappearance substantially identical to human sensors as those in E5(t).The second and the third inputs E10(t) and E1(t) are also in the file180 for candidate envelopes known a priori to both the sander and thereceiver.

The mathematic derivations are identical to the ones for FIG. 2 when weuse a 4-to-4 Hadamard matrix for both the WF muxing and demuxing. The4-to-4 WF muxing in the preprocessing 630 is formulated based onEquation (7) as:

$\begin{matrix}{\begin{bmatrix}{{Ex}(t)} \\{O\; 2} \\{{Ey}(t)} \\{O\; 4}\end{bmatrix} = {\begin{bmatrix}{+ 1} & {+ 1} & {+ 1} & {+ 1} \\{+ 1} & {- 1} & {+ 1} & {- 1} \\{+ 1} & {+ 1} & {- 1} & {- 1} \\{+ 1} & {- 1} & {- 1} & {+ 1}\end{bmatrix}\begin{bmatrix}{{am}*E\; 5(t)} \\{E\; 1(t)} \\{E\; 10(t)} \\{S(t)}\end{bmatrix}}} & \left( {7\text{-}3} \right)\end{matrix}$

The first and the third outputs, O1 and O3, are named Ex(t) and Ey(t)respectively. The other 2 outputs are grounded in FIG. 8. The scalingfactor am is set to ˜10, so that both the Ex(t) and Ey(t) appearsubstantially identical to the appearance of E5(t) to human sensors.Ex(t) and Ey(t) are to be delivered to destinations via cloud 010.

FIG. 9 is a block diagram of de-enveloping in a destination; reversedprocessing of those in FIG. 8. It depicts a receiving (Rx) operationconcept of de-enveloping using higher order WF de-multiplexingtechniques for de-enveloping a message data set.

Only two of the four WF muxed data set are sent to a destination viacloud 010. The required communication channel bandwidth may be abouttwice as that of S(t) signal itself. Each of the two enveloped files maybe as large as that of S(t) itself when the digital envelope, E5, isproperly chosen and further optimized in pre-processing 630 accordingly.Additional bandwidth differentials are due to processing overhead.

In the post-processing 640 a 4-to-4 WF demuxing is incorporated. Thereare four inputs; (1) Ex(t) a first received data set, (2) Ey(t) a secondreceived data set, (3) E10(t) a known digital data in the envelopcandidate file 180, and (4) E5(t) a known digital data for the selecteddigital envelop. Based on Equation (7-3);

Ex(t)=am*E5(t)+E1(t)+E10(t)+S(t)  (7-4)

Ey(t)=am*E5(t)+E1(t)−E10(t)−S(t)  (7-5)

And S(t)=[Ex(t)−Ey(t)]/2−E10(t)  (9)

Two received enveloped files, Ex(t) and Ey(t), are used in Equation (9).The third input for the 4-to-4 WF demuxing is E10(t); a known data set.The fourth input for the 4-to-4 WF demuxing is E5(t); also a known dataset. But the formulation in Equation 9 does not need E5(t) in restoringS(t). However, there are 6 different combinations in choosing 2 from 4WF muxed files as the 2 enveloped carriers. Many of the 6 configurationsrequires more than one known data sets among E10, E1, and E5 in order torestore S(t).

The recovered S(t) from the WF demuxing shall be the embedded messagedelivered and shall comprise of the phrase of “Open Sesame” and itsChinese translation by 4 Chinese characters.

Furthermore according to Equation (7-2), O2, and O4 can now bereconstructed based on the recovered S(t) at the destination. Therestructured O2, and O4 may be used for enhanced identifications.

Embodiment 6

FIG. 10 depicts a transmitting (Tx) operation concept of envelopingusing higher order WF multiplexing techniques for enveloping a messagedata set. We use a 4-to-4 WF muxing to exemplify operation concepts.Three of the four outputs from a 4-to-4 WF muxing are used as envelopeddata sets to be sent to destinations via cloud 010.

A 4-to-4 WF muxing is implemented in the pre-processing 630. The fourinputs are connected to S(t), E10(t), E1(t), and E5(t), and only threeoutputs used for Ex(t), Ey(t) and Ez(t). The remaining one output of theWF muxing is grounded. There are 4 possible configurations to choose 3out of four outputs. S(t) comprises of a phrase of “Open Sesame” and itsChinese translation by 4 Chinese characters, and is the message to bedelivered to destinations via cloud. E5(t) is the selected envelope andis one of the candidate envelopes in the candidate file 180. As to thefirst output Ex(t), the second output Ey(t), and the third output Ez(t),each features an appearance substantially identical to human sensors asthose in E5(t). The second and the third inputs E10(t) and E1(t) arealso in the file 180 for candidate envelopes known a priori to both thesender and the receiver.

The mathematic derivations are identical to the ones for FIG. 2 when weuse a 4-to-4 Hadamard matrix for both the WF muxing and demuxing. The4-to-4 WF muxing in the preprocessing 630 is formulated based onEquation (7) as:

$\begin{matrix}{\begin{bmatrix}{{Ex}(t)} \\{{Ey}(t)} \\{{Ez}(t)} \\{O\; 4}\end{bmatrix} = {\begin{bmatrix}{+ 1} & {+ 1} & {+ 1} & {+ 1} \\{+ 1} & {- 1} & {+ 1} & {- 1} \\{+ 1} & {+ 1} & {- 1} & {- 1} \\{+ 1} & {- 1} & {- 1} & {+ 1}\end{bmatrix}\begin{bmatrix}{{am}*E\; 5(t)} \\{E\; 1(t)} \\{E\; 10(t)} \\{S(t)}\end{bmatrix}}} & \left( {7\text{-}6} \right)\end{matrix}$

The first, second and the third outputs, O1, O2, and O3, are namedEx(t), Ey(t), and Ez(t) respectively. The fourth output is grounded inFIG. 10. The scaling factor am is set to ˜10, so that both the Ex(t),Ey(t), and Ez(t) appear substantially identical to the appearance ofE5(t) to human sensors. Ex(t), Ey(t), and Ez(t) are to be delivered todestinations via cloud 010.

The required communication channel bandwidth may be about three times asthat of S(t) signal itself. Each of the three enveloped files may be aslarge as that of S(t) itself when the digital envelope, E5, is properlychosen and further optimized in pre-processing 630 accordingly.Additional bandwidth differentials are due to processing overhead.

FIG. 11 is a block diagram of de-enveloping in a destination; reversedprocessing of those in FIG. 10. It depicts a receiving (Rx) operationconcept of de-enveloping a message data. Only two of the three WF muxeddata sets sent via cloud 010 are received at a desired destination ontime. It is assume that Ex(t) and Ey(t) are received at the destination.

In the post-processing 640 a 4-to-4 WF demuxing is incorporated. Thereare four inputs; (1) Ex(t) a first received data set, (2) Ey(t) a secondreceived data set, (3) E10(t) a known digital data in the envelopcandidate file 180, and (4) E5(t) a known digital data for the selecteddigital envelop. Based on Equation (7-6);

Ex(t)=am*E5(t)+E1(t)+E10(t)+S(t)  (7-8)

Ey(t)=am*E5(t)−E1(t)+E10(t)−S(t)  (7-9)

Ez(t)=am*E5(t)+E1(t)−E10(t)−S(t)  (7-10)

And S(t)=[Ex(t)−Ey(t)]/2+E1(t)  (10)

Two received enveloped files, Ex(t) and Ey(t), are used in Equation(10). The third input for the 4-to-4 WF demuxing is E1(t); a known dataset. The fourth input for the 4-to-4 WF demuxing is E5(t); also a knowndata set. But the formulation in Equation (10) does not need E5(t) inrestoring S(t).

The recovered S(t) from the WF demuxing shall be the embedded messagedelivered and shall comprise of the phrase of “Open Sesame” and itsChinese translation by 4 Chinese characters.

Furthermore according to Equation (7-2), O3, and O4 can now bereconstructed based on the recovered S(t) at the destination. Therestructured O3, and O4 may be used for enhanced identifications.

FIG. 12 is a block diagram of de-enveloping in a destination; reversedprocessing of those in FIG. 10. It depicts a receiving (Rx) operationconcept of de-enveloping a message data. Two of the three WF muxed datasets sent via cloud 010 are received at a desired destination on time.Ez(t) and Ey(t) are received at the destination.

In the post-processing 640 a 4-to-4 WF demuxing is incorporated. Thereare four inputs; (1) Ex(t) a first received data set, (2) Ey(t) a secondreceived data set, (3) E10(t) a known digital data in the envelopcandidate file 180, and (4) E5(t) a known digital data for the selecteddigital envelop. Based on Equation (7-6);

Ey(t)=am*E5(t)−E1(t)+E10(t)−S(t)  (7-11)

Ez(t)=am*E5(t)+E1(t)−E10(t)−S(t)  (7-12)

And S(t)=am*E5(t)−[Ey(t)+Ez(t)]/2  (11)

Two received enveloped files, Ey(t) and Ez(t), are used in Equation(11). The third input for the 4-to-4 WF demuxing is E1(t); a known dataset. The fourth input for the 4-to-4 WF demuxing is E5(t); also a knowndata set. But the formulation in Equation (11) does not need E1(t) inrestoring S(t). The recovered S(t) from the WF demuxing shall be theembedded message delivered and shall comprise of the phrase of “OpenSesame” and its Chinese translation by 4 Chinese characters. FurthermoreO1 and O4 can now be reconstructed according to Equation (7-6) based onthe recovered S(t) at the destination. The restructured O1 and O4 may beused for enhanced identifications.

FIG. 13 is a block diagram of de-enveloping in a destination; reversedprocessing of those in FIG. 10. It depicts a receiving (Rx) operationconcept of de-enveloping a message data, when all three WF muxed datasets sent via cloud 010 are received at a desired destination on time.Ex(t), Ey(t) and Ez(t) are received at the destination on time.

In the post-processing 640 a 4-to-4 WF demuxing is incorporated. Thereare four inputs; (1) Ex(t) a first received data set, (2) Ey(t) a secondreceived data set, (3) E1(t) a known digital data in the envelopcandidate file 180, and (4) Ez(t) a third received data set.

Based on Equation (7-6);

Ex(t)=am*E5(t)+E1(t)+E10(t)+S(t)  (7-13)

Ey(t)=am*E5(t)−E1(t)+E10(t)−S(t)  (7-14)

Ez(t)=am*E5(t)+E1(t)−E10(t)−S(t)  (7-15)

And S(t)=am*E5(t)−[Ey(t)+Ez(t)]/2  (12-1)

Or S(t)=[Ex(t)−Ey(t)]/2−E1(t)  (12-2)

Or S(t)=[Ex(t)−Ez(t)]/2−E10(t)  (12-3)

Two of the three received enveloped files, Ex(t), Ey(t) and Ez(t), areused in Equation (12). There are three options to restore the embeddedmail, S(t); as delineated in Equations (12-1), (12-2), and (12-3),respectively. They all need a third input for the 4-to-4 WF demuxing.The required 3^(rd) file for a restoration processing according toEquation (12-1) is the digital file of the original digital envelopeE5(t). Similarly the 3^(rd) files for those according to Equation (12-2)and (12-3) are the digital file of E1(t) and that of E10(t),respectively.

With the flexibility in all 3 techniques in Equations (12), a receivermay pick any first two of three possible arrivals, Ex(t), Ey (t) andEz(t), in restoring the S(t). For delivering music or video clips, thesetechniques at a destination feature redundancies for bettersurvivability, and enhanced streaming speed of S(t) using only first twoarrivals and discarding the last (the third) arrival among the three WFmuxed files sent by a source.

In different embodiments for various applications, multiple restorationmeans described above may be used to differentiating service preferencesin a multicasting, or broadcasting modes. For those without accessing toE1 and E10; their services can be completely denied by sending Ey and Ezonly via cloud 010. Similarly, controlling delivery of Ex(t) to a slowerrate via cloud 010 in streaming a video clip, there will only be ⅓probability at a normal rate to restore S(t) by using first two arrivalsout of three total arrivals in a receiver at destinations. Thecorresponding overall flow rate may be degraded by ⅔ in receivers to aflow rate at 33% of a normal flow, when Ex(t) delivery are delayedsignificantly.

FIG. 14 is a block diagram of de-enveloping in a destination; reversedprocessing of those in FIG. 10. It is for a scenario that the 3 selectedWF muxed data sets to be sent via cloud 010 are Ex(t), Ey(t), and Ew(t).It depicts a receiving (Rx) operation concept of de-enveloping a messagedata, when all three WF muxed data sets sent via cloud 010 are receivedat a desired destination on time. Ex(t), Ey(t) and Ew(t) are received atthe destination on time.

In the post-processing 640 a 4-to-4 WF demuxing is incorporated. Thereare four inputs; (1) Ex(t) a first received data set, (2) Ey(t) a secondreceived data set, (3) E1(t) a known digital data in the envelopcandidate file 180, and (4) Ez(t) a third received data set.

Based on Equation (7-6);

Ex(t)=am*E5(t)+E1(t)+E10(t)+S(t)  (7-16)

Ey(t)=am*E5(t)−E1(t)+E10(t)−S(t)  (7-17)

Ew(t)=am*E5(t)−E1(t)−E10(t)+S(t)  (7-18)

And S(t)=E10(t)+[Ey(t)−Ew(t)]/2  (12-4)

Or S(t)=[Ex(t)−Ey(t)]/2−E1(t)  (12-5)

Or S(t)=[Ex(t)+Ew(t)]/2−am E5(t)  (12-6)

Two of the three received enveloped files, Ex(t), Ey(t) and Ew(t), areused in Equation (12). There are three options to restore the embeddedmail, S(t); as delineated in Equations (12-4), (12-5), and (12-6),respectively. They all need a third input for the 4-to-4 WF demuxing;similar to the block diagram in FIG. 13. The required 3^(rd) file for arestoration processing according to Equation (12-4) is the digital fileof the original digital file E10(t). Similarly the 3^(rd) files forthose according to Equation (12-5) and (12-6) are the digital file ofE1(t) and that of E5(t), respectively.

With the flexibility in all 3 techniques in Equations (12), a receivermay pick any first two of three possible arrivals, Ex(t), Ey(t) andEw(t), in restoring the S(t). For delivering music or video clips, thesetechniques at a destination feature redundancies for bettersurvivability, and enhanced streaming speed of S(t) using only first twoarrivals and discarding the last (the third) arrival among the three WFmuxed files sent by a source.

Embodiment 7

FIG. 15 depict a Tx operation concept of double enveloping using WFmultiplexing for enveloping a message data set via two envelopessequentially. It depicts first two of the three segments in FIG. 1: (1)a pre-processing or enveloping 130, (2) transported via cloud 010, and(3) post processing or de-enveloping 140.

There are two enveloping processing in series in FIG. 15. The innerenveloping and the outer enveloping are, respectively, identical to theenveloping shown in FIG. 6 and that in FIG. 1. In the firstpre-processing 630, there are four inputs connected to 4 digital datafiles, S(t), E10(t), E1(t), and E4(t), and a first of the 4 outputs isassigned as output w(t). The other 3 outputs, x(t), y(t), and z(t), aregrounded. S(t) comprises of a phrase of “Open Sesame” and its Chinesetranslation, and is the message to be delivered to destinations viacloud. E4(t) is a selected inner envelope and is one of the candidateenvelopes in the candidate file 180. The first output w(t) features anappearance substantially identical to human sensors as that in E4(t).

In the second preprocessing 130, there are two inputs, w(t) and E5(t),and a first output assigned as output Es(t). The second output isgrounded. E5(t) is a selected outer envelope and is also one of thecandidate envelopes in the candidate file 180. The first output Es(t)features an appearance substantially identical to human sensors as thatin E5(t).

Only one WF muxed file, Es(t) is sent to destinations via cloud 010.There is no phrase of “Open Sesame” or its Chinese translation on theappearance of Es(t). The required bandwidth for transporting the Es(t)shall be near identical to that of sending S(t) via cloud when theenveloping files, E4(t) or E5(t) are properly chosen.

In other embodiments, images in the enveloping files may have beenprocessed for various purposes such as minimized dynamic range ofindividual pixels or simply for enhanced authentication andidentifications before WF muxing. Many can be pre-stored in the envelopcandidate files as optional candidates. Certainly, these additionalprocessing can be included as a part of the first pre-processing 630and/or the second 130.

FIG. 16 depicts a receiving (Rx) operation concept of de-envelopingdoubly enveloped messages using WF demultiplexing techniques. There aretwo de-enveloping processing in series. A first post-processing 140 toopen the outer envelope is identical to the de-enveloping shown inFIG. 1. There are two inputs connected to Es(t) and E5(t). Es(t) is thereceived digital data file with embedded message for a desired receiverin the destination, and shall be substantially equivalent to the onlyoutput of the second pre-processing 130 in FIG. 15. In addition it shallfeature an appearance substantially identical to human sensors as thosein E5(t). E5(t) is a selected outer envelope and is one of the candidateenvelopes in a candidate file 180 known priori to both the sender andthe receiver.

Similarly, there are two outputs from the post processor 140. The firstoutput w(t) of the first post processor 140 features an appearancesubstantially identical to human sensors as those in E4(t). The secondoutput is grounded.

In the second post-processing 640, there are four inputs, connected tow(t), E10(t), E1(t), and E4(t). E4(t) is the selected inner envelope andis one of the candidate envelopes in the candidate file 180. E10(t) andE1(t) are digital files in the candidate file 180. There are twooutputs, and the first one is assigned as output S(t) and a second oneis grounded. The first output is the recovered embedded message.

It is conceivable to extend the double enveloping/de-enveloping depictedin FIG. 15 and FIG. 16 to multiple layers of enveloping andde-enveloping by cascading more M-to-M WF muxing processors inpreprocessing in a source and more M-to-M WF demuxing processors in postprocessing in a receiver, where M≧2 and is an integer.

Additional Comments

With regards to the above applications via WF muxing, a WF muxer mayalternatively perform a first non-orthogonal matrix on the inputs of theWF muxer. With regards to the above WF demuxing applications, a WFdemuxer may alternatively perform a second non-orthogonal matrix,inverse to the first non-orthogonal matrix, on the inputs of the WFmuxer.

The components, steps, features, benefits and advantages that have beendiscussed are merely illustrative. None of them, nor the discussionsrelating to them, are intended to limit the scope of protection in anyway. Numerous other embodiments are also contemplated. These includeembodiments that have fewer, additional, and/or different components,steps, features, benefits and advantages. These also include embodimentsin which the components and/or steps are arranged and/or ordereddifferently.

Unless otherwise stated, all measurements, values, ratings, positions,magnitudes, sizes, and other specifications that are set forth in thisspecification, including in the claims that follow, are approximate, notexact. They are intended to have a reasonable range that is consistentwith the functions to which they relate and with what is customary inthe art to which they pertain. Furthermore, unless stated otherwise, thenumerical ranges provided are intended to be inclusive of the statedlower and upper values. Moreover, unless stated otherwise, all materialselections and numerical values are representative of preferredembodiments and other ranges and/or materials may be used.

The scope of protection is limited solely by the claims, and such scopeis intended and should be interpreted to be as broad as is consistentwith the ordinary meaning of the language that is used in the claimswhen interpreted in light of this specification and the prosecutionhistory that follows, and to encompass all structural and functionalequivalents thereof.

What is claimed is:
 1. A data transport system between a sender and areceiver comprising: A preprocessing device at a source, wherein thepre-processing device is configured to perform a transformation frommultiple inputs to multiple outputs; wherein the multiple inputscomprising a first input stream for embedded data information, and asecond stream as a digital envelop file; wherein a first output of thepreprocessing device comprising a weighted sum of the first and thesecond inputs and the weighted sum in a digital format appearing tohuman sensors with substantially identical distinguishable features assaid second input stream, A transmission channel through IP cloud to adestination for said first output from the preprocessor at the source;and A post-processing device at said destination, wherein thepost-processing device is configured to perform a transformation frommultiple inputs to multiple outputs; wherein the multiple inputscomprising the received said first output of the preprocessing device,and wherein a first output comprising recovered embedded datainformation.
 2. The data transport system of claim 1, wherein saidtransform in said pre-processor further comprising preferentialweighting to one of said inputs in generating multiple digital outputsin image, video, or audio formats to human sensors with substantiallyidentical appearances to a format of appearance of said input.
 3. Thedata transport system of claim 1, wherein said transform in saidpre-processor further comprising a wavefront multiplexing with anorthogonal matrix transform,
 4. The transform in of claim 2 furthercomprising a Fourier transform.
 5. The transform in of claim 2 furthercomprising a Hadamard transform.
 6. The data transport system of claim1, wherein the said transform in said pre-processor further comprised anon-orthogonal full-rank matrix transform.
 7. The data transport systemof claim 1, wherein the said multiple inputs to said pre-processorcomprised a known data set.
 8. The data transport system of claim 1,wherein one of said multiple outputs to said pre-processor is grounded.9. The data transport of claim 1, wherein said multiple inputs to saidpre-processor further comprises an authentication data set.
 10. Anenveloping system for a data file comprising at least two cascadedpreprocessors at a source location wherein a first preprocessorconfigured to transform multiple input data sets into multiple outputdata sets, wherein one input comprising the data file, and second inputcomprising a digital file for an inner envelop, wherein an outputcomprising a first weighted sum of all inputs with an appearance tohuman sensor substantially identical to the appearance of digital innerenvelop in a same image, video or audio, and wherein the output isfurther configured as an enveloped data file by the inner envelope.wherein a second preprocessor configured to transform multiple inputdata sets into multiple output data sets, wherein one input for thesecond preprocessor comprising an enveloped data file by said innerenvelope, and second input comprising a digital file for a secondenvelop, wherein an output of the second preprocessor comprising asecond weighted sum of all inputs to the second pre-processor with anappearance to human sensor substantially identical to the appearance ofthe second digital envelop in a same image, video or audio format. 11.The data file enveloping system of claim 10, wherein said transform insaid pre-processors further comprising a wavefront multiplexing with anorthogonal matrix transform,
 12. The transform in of claim 11 furthercomprising a Fourier transform.
 13. The transform in of claim 11 furthercomprising a Hadamard transform.
 14. The data file enveloping system ofclaim 10, wherein the said transform in said pre-processors furthercomprising a wavefront multiplexing with a non-orthogonal full-rankmatrix transform.
 15. The data file enveloping system of claim 10,wherein the said multiple inputs to said pre-processors comprised aknown data set.
 16. The data file enveloping system of claim 10, whereinone of said multiple outputs to said pre-processors is grounded.
 17. Ade-enveloping system for a data file comprising at least two cascadedpostprocessors at a destination wherein a first post-processorconfigured to transform multiple input data sets into multiple outputdata sets, wherein one input comprising a received enveloped data file,and second input comprising a digital file for an outmost envelopwherein an output comprising a first weighted sum of all inputs of thefirst post-processor with an appearance to human sensor substantiallyidentical to the appearance of the outmost digital envelop in a sameimage, video or audio format, and wherein the output is furtherconfigured as a de-enveloped data file at an outmost layer by theoutmost envelope. wherein a second post-processor configured totransform multiple input data sets into multiple output data sets,wherein one input for the second post-processor comprising ade-enveloped data file by said the outmost envelope, and second inputcomprising a digital file for a second outmost envelop wherein an outputof the second post-processor comprising a recovered digital datainformation.
 18. The data file de-enveloping system of claim 17, whereinsaid transform in said post-processors further comprising a wavefrontde-multiplexing with an orthogonal matrix transform.
 19. The data filede-enveloping system of claim 17, wherein the said transform in saidpost processors further comprising a wavefront demultiplexing with anon-orthogonal full-rank matrix transform.
 20. The data filede-enveloping system of claim 17, wherein the said multiple inputs tosaid post-processors comprised a known data set.