WO2003017201A1 - Increasing the size of a data-set and watermarking - Google Patents

Increasing the size of a data-set and watermarking Download PDF

Info

Publication number
WO2003017201A1
WO2003017201A1 PCT/IB2002/002931 IB0202931W WO03017201A1 WO 2003017201 A1 WO2003017201 A1 WO 2003017201A1 IB 0202931 W IB0202931 W IB 0202931W WO 03017201 A1 WO03017201 A1 WO 03017201A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
content material
encoded
encoding
encoded content
Prior art date
Application number
PCT/IB2002/002931
Other languages
French (fr)
Inventor
Michael A. Epstein
Original Assignee
Koninklijke Philips Electronics N.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics N.V. filed Critical Koninklijke Philips Electronics N.V.
Priority to KR10-2004-7002120A priority Critical patent/KR20040020983A/en
Priority to EP02749189A priority patent/EP1419479A1/en
Priority to JP2003522034A priority patent/JP2005500575A/en
Publication of WO2003017201A1 publication Critical patent/WO2003017201A1/en

Links

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00884Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a watermark, i.e. a barely perceptible transformation of the original data which can nevertheless be recognised by an algorithm

Definitions

  • This invention relates to the field of data protection, and in particular to protecting data from illicit copying from a remote location.
  • copy-protected material may contain watermarks or other encodings that identify the material as being copy-protected, and also contains other encodings that identify whether this particular copy of the material is an authorized copy, and whether it can be copied again.
  • an authorized copy of content material may contain a robust watermark and a fragile watermark.
  • the robust watermark is intended to be irremovable from the encoding of the content material. Attempting to remove the watermark causes damage to the content material.
  • the fragile watermark is intended to be damaged when the content material is illicitly copied.
  • a content-processing device that is configured to enforce copy protection rights in this example will be configured to detect the presence of a robust watermark, and prevent the processing of the content material containing this robust watermark unless the fragile watermark is also present.
  • a watermarking process is particularly tailored to the general characteristics of the content material.
  • the watermark in the frequency domain, the watermark is configured to lie within the baseband of the original content material. Spatial masking is used to render the watermark material inaudible, even though it is in the baseband of the original content material.
  • a watermarking of a video signal requires a different type of masking to assure that it does not create visible distortion in the rendered images.
  • the watermarking of data such as a text file, will require a different type of masking to assure that it does not adversely affect the processing of the data by typical application programs.
  • data is added to the original content material, generally before watermarking, as illustrated in FIG. 1.
  • This figure illustrates a conventional concatenation of content material 110 and data 120 to form a composite data file 150 that is provided to a watermarking system 180. Note, however, that the combination of a data- addition and watermarking, can often be problematic. If the data 120 is added before the watermarking, and if the data 120 does not have the same general characteristics of the content material 110, the composite data and content material 150 may be incompatible with the watermarking process 180, or, the watermarking process 180 may adversely affect the added data 120.
  • the watermarking process 180 may filter out these components before applying the watermark, thereby distorting the data 120. Or, if the watermarking process 180 does not contain a filter, the out-of-baseband components of the data 120 may cause aliasing when the watermarking process 180 is applied. This aliasing will likely produce frequency components in the baseband of the content material 110, thereby causing a distortion of the content material 110 and/or a distortion of the watermark.
  • FIG. 1 illustrates an example prior art concatenation process for adding data to content material.
  • FIG. 2 illustrates an example block diagram of a processing system for adding data to content material in accordance with this invention.
  • FIG. 3 illustrates an example block diagram of an audio encoding system in accordance with this invention.
  • the same reference numerals indicate similar or corresponding features or functions.
  • a common method of misappropriating content material is to copy the material from its original media, such as the original purchased CD containing the content material, and providing it to others.
  • Such misappropriated content material is often made available from a remote source, via the Internet.
  • individual songs are downloaded from the Internet, rather than the entire set of material constituting the material on the original media.
  • This invention is presented using a misappropriation of material via the Internet as a paradigm for the means of obtaining unauthorized material, although the principles of this invention are applicable to copy-protection schemes in general, without regard to how the unauthorized material is obtained.
  • a variety of techniques may be employed to assure that the content material is provided from the original purchased CD, rather than from a downloaded copy of the content material.
  • the use of fragile watermarking facilitates the detection of a compression and subsequent decompression of the original content material, based on the assumption that, for efficient downloading via the Internet, the illicit copy of the original content material will be compressed, using for example, an MP3 encoding.
  • MP3 MP3 encoding
  • Random sampling techniques may be employed to verify the presence of the entirety to a desired level of confidence, without verifying the presence of each byte or segment of the entire data set.
  • a compliant playback or recording device is configured to refuse to render an individual song in the absence of verification that the entire contents of the CD is present.
  • the entire contents of the CD can be present, at a download "cost" of over an hour, the likelihood of a theft of a song via a wide-scale distribution on the Internet is substantially reduced.
  • the size of the data set can be increased by adding bytes to the original content material. That is, for example, a typical audio CD may be encoded with as much as 650 megabytes of data. If a particular collection of songs does not amount to the full capacity of a CD, data can be added to create a data set on the CD that consumes the entire amount. Preferably, random data bytes are added, to further frustrate attempts to compress the data set, or other attempts to avoid this security measure. This random data will be associated with the entirety of the data set, as additional segments within the data set. Alternatively, non random data, such as a particular security code, or a set of instructions that effect particular actions on select rendering devices, and so on, may be added as well.
  • non random data such as a particular security code, or a set of instructions that effect particular actions on select rendering devices, and so on, may be added as well.
  • anomalous behavior may occur when the combination of the data and the original content material is presented to a post processor, such as a watermarking system. This anomalous behavior may affect the decoding of the original content material, the added data, or the watermark, or a combination of each. This anomalous behavior will be caused by characteristics of the random data that do not conform to the expected or implied characteristics of the original content material. As noted above, the non-conformance will typically be exhibited as frequency components that are beyond the characteristic baseband of the original content material, although other non-conforming characteristics may also be present.
  • the data that is added to the original content material is constrained to be compliant with the characteristics of the encoded content material.
  • this compliance is achieved by submitting the added data to the same encoding process that is used to produce the encoded content material.
  • a standard encoding form for an audio CD is a "Redbook" encoding. If the content material is encoded in a Redbook form, in a preferred embodiment of this invention, the added data is also encoded via a Redbook encoder.
  • FIG. 2 illustrates an example block diagram of an encoding system in accordance with this invention.
  • the system comprises a preprocessor 230, and a combiner 240.
  • the system is configured to provide a composite output that is compatible with a postprocessor 280 that is compatible with the original content material. That is, if the post- processor 280 is a watermarking system (180 in FIG. 1) that is configured to create watermarks for Redbook encoded audio data, the system is configured to assure that the combination of the content material 110 and the added data 120 conforms to the Redbook standard, regardless of the characteristics of the added data.
  • the added data 120 may be an analog audio noise signal that is provided to a convention Redbook encoder as the preprocessor 230.
  • the added data 120 may be binary digits
  • the preprocessor 230 is configured to convert this data 120 into an audio input to a conventional Redbook encoder.
  • the combiner 240 combines the original content material 110 and the preprocessed data from the preprocessor 230 to produce the combined output, typically as a concatenation of the original content material 110 and the preprocessed data.
  • the portion of the combined output that corresponds to the preprocessed data is suitably distinguished from the original content material, so that a conventional playback device will not attempt to render the preprocessed data into an audible form.
  • FIG. 3 illustrates an example block diagram of an encoding system 300 in accordance with this invention that is configured to encode added digital data, such as random bytes, into a form that is suitable for watermarking.
  • the digital data 120 is provided to a modulator 320 that is configured to convert binary digits into audio tones.
  • the modulator 320 may be a conventional modem that converts binary digits into tones that are transmitted over a telephone line.
  • the audio output from the modulator 320 is provided to a conventional digital recorder 330 that encodes the audio output into a form that is compatible with the form of the content material.
  • the digital recorder 330 is preferably the same type of recorder 330' that an audio performer might have used to provide the original content material 110.
  • the output of the recorder 330 is assured to be compatible with the output of the recorder 330' (i.e. the content material 110).
  • the combination 350 of the content material 110 and the encoded data from the recorder 330 is known to be compatible with the watermarking system 180 that is compatible with the output of the recorder 330'. It is then a simple matter to watermark the combination 350 as a single data set.
  • the added data may be random visual or audio noise, or a combination of both, that is encoded into the same video format as the content material, or it may be random bits that are converted to audio and/or visual information that is subsequently encoded into the required video format.

Abstract

Some security processes call for the addition of data (120) to the content material that is to be protected. The addition of such data may, however, cause anomalous behavior in subsequent processes that are designed to process the content material only. The data (120) that is to be added to content material (210) is preprocessed using a preprocessor (320, 330) that has, as its output, a signal that conforms to the general characteristics of the content material. This preprocessed additional data is then added to the original content material. By preprocessing the additional data, the combined material (350) is assured to be compatible with subsequent postprocessors (180) of the combined material, such as a watermarking process.

Description

Increasing the size of a data-set and watermarking
BACKGROUND OF THE INVENTION
1. Field of the Invention
This invention relates to the field of data protection, and in particular to protecting data from illicit copying from a remote location.
2. Description of Related Art
The protection of data is becoming an increasingly important area of security. In many situations, the authority to copy or otherwise process information is verified by evaluating the encoding of copy-protected material for particular characteristics. For example, copy-protected material may contain watermarks or other encodings that identify the material as being copy-protected, and also contains other encodings that identify whether this particular copy of the material is an authorized copy, and whether it can be copied again. For example, an authorized copy of content material may contain a robust watermark and a fragile watermark. The robust watermark is intended to be irremovable from the encoding of the content material. Attempting to remove the watermark causes damage to the content material. The fragile watermark is intended to be damaged when the content material is illicitly copied. For example, common fragile watermarks are damaged if the content material is compressed or otherwise altered. In this manner, content material that is compressed in order to be efficiently communicated via the Internet will be received with a robust watermark and a damaged fragile watermark. A content-processing device that is configured to enforce copy protection rights in this example will be configured to detect the presence of a robust watermark, and prevent the processing of the content material containing this robust watermark unless the fragile watermark is also present.
Generally, a watermarking process is particularly tailored to the general characteristics of the content material. For example, in the frequency domain, the watermark is configured to lie within the baseband of the original content material. Spatial masking is used to render the watermark material inaudible, even though it is in the baseband of the original content material. A watermarking of a video signal, on the other hand, requires a different type of masking to assure that it does not create visible distortion in the rendered images. In like manner, the watermarking of data, such as a text file, will require a different type of masking to assure that it does not adversely affect the processing of the data by typical application programs.
In some security systems, data is added to the original content material, generally before watermarking, as illustrated in FIG. 1. This figure illustrates a conventional concatenation of content material 110 and data 120 to form a composite data file 150 that is provided to a watermarking system 180. Note, however, that the combination of a data- addition and watermarking, can often be problematic. If the data 120 is added before the watermarking, and if the data 120 does not have the same general characteristics of the content material 110, the composite data and content material 150 may be incompatible with the watermarking process 180, or, the watermarking process 180 may adversely affect the added data 120. For example, if the added data 120 has frequency components beyond the baseband of the content material 110, then the watermarking process 180 may filter out these components before applying the watermark, thereby distorting the data 120. Or, if the watermarking process 180 does not contain a filter, the out-of-baseband components of the data 120 may cause aliasing when the watermarking process 180 is applied. This aliasing will likely produce frequency components in the baseband of the content material 110, thereby causing a distortion of the content material 110 and/or a distortion of the watermark.
BRIEF SUMMARY OF THE INVENTION
It is an object of this invention to provide a security process and apparatus for the protection of content material via the addition of data. It is a further object of this invention to provide a security process and apparatus that allows for the watermarking of the combination of the content material and the additional data. These objects and others are achieved in an encoding system as claimed in claim 1 and an encoding method as claimed in claim 8. First, the data that is to be added to the content material, using a preprocessor that has, as its output, a signal that conforms to the general characteristics of the content material. This preprocessed additional data is then added to the original content material. By preprocessing the additional data, the combined material is assured to be compatible with subsequent postprocessors of the combined material, such as a watermarking process.
Various advantageous embodiments are set out in the dependent claims. BRIEF DESCRIPTION OF THE DRAWINGS
The invention is explained in further detail, and by way of example, with reference to the accompanying drawings wherein:
FIG. 1 illustrates an example prior art concatenation process for adding data to content material.
FIG. 2 illustrates an example block diagram of a processing system for adding data to content material in accordance with this invention.
FIG. 3 illustrates an example block diagram of an audio encoding system in accordance with this invention. Throughout the drawings, the same reference numerals indicate similar or corresponding features or functions.
DETAILED DESCRIPTION OF THE INVENTION
A common method of misappropriating content material is to copy the material from its original media, such as the original purchased CD containing the content material, and providing it to others. Such misappropriated content material is often made available from a remote source, via the Internet. Often, for ease of downloading, individual songs are downloaded from the Internet, rather than the entire set of material constituting the material on the original media. This invention is presented using a misappropriation of material via the Internet as a paradigm for the means of obtaining unauthorized material, although the principles of this invention are applicable to copy-protection schemes in general, without regard to how the unauthorized material is obtained.
A variety of techniques may be employed to assure that the content material is provided from the original purchased CD, rather than from a downloaded copy of the content material. As noted above, the use of fragile watermarking facilitates the detection of a compression and subsequent decompression of the original content material, based on the assumption that, for efficient downloading via the Internet, the illicit copy of the original content material will be compressed, using for example, an MP3 encoding. With increased access speeds to the Internet, however, it becomes increasingly feasible to download individual songs in an uncompressed form, thereby preserving the fragile watermark, and avoiding this security safeguard.
International patent application WO01/57867 (Attorney Docket US000088) teaches the prevention of access to a subset of a data-set unless the presence of an entirety of the data-set is verified. In this manner, for example, an entire CD would need to be downloaded before the system would allow access to a single song. This copending application teaches a self-referential data set that facilitates the determination of whether the entirety of the data set is present. This copending application creates a linked list of sections of a data set, encodes the link address as a watermark of each section, and verifies the presence of the entirety of the data set by verifying the presence of the linked-to sections of some or all of the sections of the data set.
International patent application WO01/59705 (Attorney Docket US000040) teaches a self-referential data set wherein each section of a data set is uniquely identified and this section identifier is associated with each section in a secure manner. To assure that a collection of sections are all from the same data set, an identifier of the data set is also securely encoded with each section. Preferably, the section identifier and the data set identifier are encoded as a watermark that is embedded in each section, preferably as a combination of robust and fragile watermarks. Using exhaustive or random sampling, the presence of the entirety of the data set is determined, either absolutely or with statistical certainty.
In each of these applications, if the entirety of the data set is not present, subsequent processing of the data items of the data set is terminated. Random sampling techniques may be employed to verify the presence of the entirety to a desired level of confidence, without verifying the presence of each byte or segment of the entire data set. In the context of digital audio recordings, a compliant playback or recording device is configured to refuse to render an individual song in the absence of verification that the entire contents of the CD is present.
The time required to download an entire album on a CD in uncompressed digital form, even at DSL and cable modem speeds, can be expected to be greater than an hour, depending upon network loading and other factors. Thus, by requiring that the entire contents of the CD be present, at a download "cost" of over an hour, the likelihood of a theft of a song via a wide-scale distribution on the Internet is substantially reduced.
To further discourage the downloading of an entirety of the data set, the size of the data set can be increased by adding bytes to the original content material. That is, for example, a typical audio CD may be encoded with as much as 650 megabytes of data. If a particular collection of songs does not amount to the full capacity of a CD, data can be added to create a data set on the CD that consumes the entire amount. Preferably, random data bytes are added, to further frustrate attempts to compress the data set, or other attempts to avoid this security measure. This random data will be associated with the entirety of the data set, as additional segments within the data set. Alternatively, non random data, such as a particular security code, or a set of instructions that effect particular actions on select rendering devices, and so on, may be added as well.
As noted above, although additional data may easily be concatenated with the original content material to form a composite data set, anomalous behavior may occur when the combination of the data and the original content material is presented to a post processor, such as a watermarking system. This anomalous behavior may affect the decoding of the original content material, the added data, or the watermark, or a combination of each. This anomalous behavior will be caused by characteristics of the random data that do not conform to the expected or implied characteristics of the original content material. As noted above, the non-conformance will typically be exhibited as frequency components that are beyond the characteristic baseband of the original content material, although other non-conforming characteristics may also be present.
In accordance with this invention, the data that is added to the original content material is constrained to be compliant with the characteristics of the encoded content material. Preferably, this compliance is achieved by submitting the added data to the same encoding process that is used to produce the encoded content material. For example, a standard encoding form for an audio CD is a "Redbook" encoding. If the content material is encoded in a Redbook form, in a preferred embodiment of this invention, the added data is also encoded via a Redbook encoder.
FIG. 2 illustrates an example block diagram of an encoding system in accordance with this invention. The system comprises a preprocessor 230, and a combiner 240. The system is configured to provide a composite output that is compatible with a postprocessor 280 that is compatible with the original content material. That is, if the post- processor 280 is a watermarking system (180 in FIG. 1) that is configured to create watermarks for Redbook encoded audio data, the system is configured to assure that the combination of the content material 110 and the added data 120 conforms to the Redbook standard, regardless of the characteristics of the added data. In a straightforward embodiment using this example, the added data 120may be an analog audio noise signal that is provided to a convention Redbook encoder as the preprocessor 230. In a more complex embodiment, the added data 120 may be binary digits, and the preprocessor 230 is configured to convert this data 120 into an audio input to a conventional Redbook encoder. The combiner 240 combines the original content material 110 and the preprocessed data from the preprocessor 230 to produce the combined output, typically as a concatenation of the original content material 110 and the preprocessed data. Preferably, the portion of the combined output that corresponds to the preprocessed data is suitably distinguished from the original content material, so that a conventional playback device will not attempt to render the preprocessed data into an audible form. FIG. 3 illustrates an example block diagram of an encoding system 300 in accordance with this invention that is configured to encode added digital data, such as random bytes, into a form that is suitable for watermarking. In this example, the digital data 120 is provided to a modulator 320 that is configured to convert binary digits into audio tones. The modulator 320, for example, may be a conventional modem that converts binary digits into tones that are transmitted over a telephone line. The audio output from the modulator 320 is provided to a conventional digital recorder 330 that encodes the audio output into a form that is compatible with the form of the content material. As illustrated by the dashed block 330', the digital recorder 330 is preferably the same type of recorder 330' that an audio performer might have used to provide the original content material 110. By using the same recording scheme, the output of the recorder 330 is assured to be compatible with the output of the recorder 330' (i.e. the content material 110). Thereby, the combination 350 of the content material 110 and the encoded data from the recorder 330, is known to be compatible with the watermarking system 180 that is compatible with the output of the recorder 330'. It is then a simple matter to watermark the combination 350 as a single data set.
The foregoing merely illustrates the principles of the invention. It will thus be appreciated that those skilled in the art will be able to devise various arrangements which, although not explicitly described or shown herein, embody the principles of the invention and are thus within its spirit and scope. For example, although the examples provided above used audio recordings as the paradigm application for this invention, the principles of this invention may be applied to any encoding scheme. In a DVD encoding, for example, the added data may be random visual or audio noise, or a combination of both, that is encoded into the same video format as the content material, or it may be random bits that are converted to audio and/or visual information that is subsequently encoded into the required video format. These and other system configuration and optimization features will be evident to one of ordinary skill in the art in view of this disclosure, and are included within the scope of the following claims.

Claims

CLAIMS:
1. An encoding system for adding data to encoded content material, the encoded content material having defined characteristics, comprising: a preprocessor that is configured to encode the data to form encoded data that conforms to the defined characteristics of the encoded content material, and a combiner that is configured to combine the encoded content material and the encoded data to form a combined encoded output that conforms to the defined characteristics of the encoded content material.
2. The encoding system of claim 1, further comprising: a postprocessor that is configured to process an input that is consistent with the defined characteristics of the encoded content material, and wherein the combined encoded output is provided as the input to the postprocessor.
3. The encoding system of claim 2, wherein the postprocessor includes a watermarking system.
4. The encoding system of claim 3, wherein the watermarking system is configured to provide at least one of: a fragile watermark and a robust watermark, based on the combined encoded output.
5. The encoding system of claim 1 , wherein the data comprises an analog noise signal, and the preprocessor is configured to receive the analog noise signal and to produce therefrom the encoded data as a digital encoding.
6. The encoding system of claim 1 , wherein the data comprises a digital signal, and the preprocessor is configured to receive the digital signal, and includes: a modulator that converts the digital signal to an analog signal, and an encoder that processes the analog signal to form the encoded data as a digital encoding.
7. The encoding system of claim 6, wherein the encoder is substantially equivalent to a device that provides the encoded content material having the defined characteristics.
8. An encoding method for adding data to encoded content material, the encoded content material having defined characteristics, comprising: preprocessing the data to form encoded data that conforms to the defined characteristics of the encoded content material, and combining the encoded content material and the encoded data to form a combined encoded output that conforms to the defined characteristics of the encoded content material.
9. A computer program product arranged to cause a processor to execute the method of claim 8.
PCT/IB2002/002931 2001-08-13 2002-07-11 Increasing the size of a data-set and watermarking WO2003017201A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
KR10-2004-7002120A KR20040020983A (en) 2001-08-13 2002-07-11 Increasing the size of a data-set and watermarking
EP02749189A EP1419479A1 (en) 2001-08-13 2002-07-11 Increasing the size of a data-set and watermarking
JP2003522034A JP2005500575A (en) 2001-08-13 2002-07-11 Methods for increasing the size of data sets and watermarking

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/928,677 2001-08-13
US09/928,677 US20030031317A1 (en) 2001-08-13 2001-08-13 Increasing the size of a data-set and watermarking

Publications (1)

Publication Number Publication Date
WO2003017201A1 true WO2003017201A1 (en) 2003-02-27

Family

ID=25456596

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2002/002931 WO2003017201A1 (en) 2001-08-13 2002-07-11 Increasing the size of a data-set and watermarking

Country Status (6)

Country Link
US (1) US20030031317A1 (en)
EP (1) EP1419479A1 (en)
JP (1) JP2005500575A (en)
KR (1) KR20040020983A (en)
CN (1) CN1541372A (en)
WO (1) WO2003017201A1 (en)

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7644282B2 (en) 1998-05-28 2010-01-05 Verance Corporation Pre-processed information embedding system
US6912315B1 (en) * 1998-05-28 2005-06-28 Verance Corporation Pre-processed information embedding system
US6737957B1 (en) 2000-02-16 2004-05-18 Verance Corporation Remote control signaling using audio watermarks
EP2442566A3 (en) 2002-10-15 2012-08-08 Verance Corporation Media Monitoring, Management and Information System
US20060239501A1 (en) 2005-04-26 2006-10-26 Verance Corporation Security enhancements of digital watermarks for multi-media content
US8020004B2 (en) * 2005-07-01 2011-09-13 Verance Corporation Forensic marking using a common customization function
US8781967B2 (en) 2005-07-07 2014-07-15 Verance Corporation Watermarking in an encrypted domain
US8259938B2 (en) 2008-06-24 2012-09-04 Verance Corporation Efficient and secure forensic marking in compressed
US8838978B2 (en) 2010-09-16 2014-09-16 Verance Corporation Content access management using extracted watermark information
US8533481B2 (en) 2011-11-03 2013-09-10 Verance Corporation Extraction of embedded watermarks from a host content based on extrapolation techniques
US8682026B2 (en) 2011-11-03 2014-03-25 Verance Corporation Efficient extraction of embedded watermarks in the presence of host content distortions
US8615104B2 (en) 2011-11-03 2013-12-24 Verance Corporation Watermark extraction based on tentative watermarks
US8923548B2 (en) 2011-11-03 2014-12-30 Verance Corporation Extraction of embedded watermarks from a host content using a plurality of tentative watermarks
US8745403B2 (en) 2011-11-23 2014-06-03 Verance Corporation Enhanced content management based on watermark extraction records
US9323902B2 (en) 2011-12-13 2016-04-26 Verance Corporation Conditional access using embedded watermarks
US9547753B2 (en) 2011-12-13 2017-01-17 Verance Corporation Coordinated watermarking
US9571606B2 (en) 2012-08-31 2017-02-14 Verance Corporation Social media viewing system
US8726304B2 (en) 2012-09-13 2014-05-13 Verance Corporation Time varying evaluation of multimedia content
US8869222B2 (en) 2012-09-13 2014-10-21 Verance Corporation Second screen content
US9106964B2 (en) 2012-09-13 2015-08-11 Verance Corporation Enhanced content distribution using advertisements
US9262794B2 (en) 2013-03-14 2016-02-16 Verance Corporation Transactional video marking system
US9251549B2 (en) 2013-07-23 2016-02-02 Verance Corporation Watermark extractor enhancements based on payload ranking
US9208334B2 (en) 2013-10-25 2015-12-08 Verance Corporation Content management using multiple abstraction layers
WO2015138798A1 (en) 2014-03-13 2015-09-17 Verance Corporation Interactive content acquisition using embedded codes

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001057867A2 (en) * 2000-02-07 2001-08-09 Koninklijke Philips Electronics N.V. Protecting content from illicit reproduction

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5715403A (en) * 1994-11-23 1998-02-03 Xerox Corporation System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
US6519700B1 (en) * 1998-10-23 2003-02-11 Contentguard Holdings, Inc. Self-protecting documents
US20020196941A1 (en) * 2001-06-21 2002-12-26 Isaacson Shawn Ray Method and system for providing secure digital sound recording
US20030016825A1 (en) * 2001-07-10 2003-01-23 Eastman Kodak Company System and method for secure watermarking of a digital image sequence

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001057867A2 (en) * 2000-02-07 2001-08-09 Koninklijke Philips Electronics N.V. Protecting content from illicit reproduction

Also Published As

Publication number Publication date
CN1541372A (en) 2004-10-27
EP1419479A1 (en) 2004-05-19
JP2005500575A (en) 2005-01-06
US20030031317A1 (en) 2003-02-13
KR20040020983A (en) 2004-03-09

Similar Documents

Publication Publication Date Title
US20030031317A1 (en) Increasing the size of a data-set and watermarking
US7398395B2 (en) Using multiple watermarks to protect content material
US9349411B2 (en) Digital watermarking and fingerprinting applications for copy protection
JP2000508813A (en) Recording signal copy protection system
KR100679879B1 (en) Protecting content from illicit reproduction by proof of existence of a complete data set using security identifiers
EP1185957A2 (en) Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections
US20020144130A1 (en) Apparatus and methods for detecting illicit content that has been imported into a secure domain
US7213004B2 (en) Apparatus and methods for attacking a screening algorithm based on partitioning of content
AU784650B2 (en) Protecting content from illicit reproduction by proof of existence of a complete data set
JPH11316599A (en) Electronic watermark embedding device, audio encoding device, and recording medium
US6976173B2 (en) Methods of attack on a content screening algorithm based on adulteration of marked content
US20020143502A1 (en) Apparatus and methods for attacking a screening algorithm using digital signal processing
US20020183967A1 (en) Methods and apparatus for verifying the presence of original data in content while copying an identifiable subset thereof
US20020144132A1 (en) Apparatus and methods of preventing an adulteration attack on a content screening algorithm
US20020199107A1 (en) Methods and appararus for verifying the presence of original data in content

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): CN JP

Kind code of ref document: A1

Designated state(s): CN JP KR

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FR GB GR IE IT LU MC NL PT SE SK TR

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2002749189

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2003522034

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 20028157842

Country of ref document: CN

Ref document number: 1020047002120

Country of ref document: KR

WWP Wipo information: published in national office

Ref document number: 2002749189

Country of ref document: EP

WWR Wipo information: refused in national office

Ref document number: 2002749189

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 2002749189

Country of ref document: EP