Method and system for secure computational outsourcing and disguise of
data, computer programs, pictures, and databases from unauthorized
access, theft, and tampering using disguising and tamperproofing
operations. In some embodiments, the disguising operation includes
generating a random number for each data element, and modifying each data
element with the random numbers. In some embodiments, the computer
program, written in a first programming language, is partitioned into
first and second programs; the first program determines whether access to
the data is authorized, the second program entangles the second program
and the data; and the second program is translated into a second
programming language. An embodiment of the present invention comprises a
method for identifying the subject of a first picture by comparison to a
second picture. Embodiments comprise securing a computer program with
real programming code by creating dummy program code and mixing the dummy
and real program code.