GB2492939A - Digitally watermarking media files and tracking to identify original recipient - Google Patents
Digitally watermarking media files and tracking to identify original recipient Download PDFInfo
- Publication number
- GB2492939A GB2492939A GB201007311A GB201007311A GB2492939A GB 2492939 A GB2492939 A GB 2492939A GB 201007311 A GB201007311 A GB 201007311A GB 201007311 A GB201007311 A GB 201007311A GB 2492939 A GB2492939 A GB 2492939A
- Authority
- GB
- United Kingdom
- Prior art keywords
- files
- file
- copies
- watermarked
- copy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000012384 transportation and delivery Methods 0.000 abstract description 14
- 238000007726 management method Methods 0.000 description 2
- 238000000034 method Methods 0.000 description 2
- 230000000903 blocking effect Effects 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000007723 transport mechanism Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
- H04N21/8358—Generation of protective data, e.g. certificates involving watermark
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/103—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for protecting copy right
Abstract
In what is sometimes referred to as â traitor tracingâ , an arrangement is disclosed for tagging (figure 1), delivering and tracking (figure 6) copies of media files. One or more copies of a media file are digitally watermarked to uniquely identify the original recipient of a watermarked copy. Following delivery of watermarked copies of files to recipients, an online tracking search, preferably automated, is performed. This forensic search is carried out to detect watermarked copies of files and to determine the respective original recipient of a detected watermarked copy. Implicitly, it is the original recipient who must have made the detected copy available and the purpose of the invention is to help protect the rights of the originator against illegal file sharing.
Description
Media tagging, tracking and delivery system This invention relates to the unique tagging and tracking of audio and video.
When video and audio is currently distributed through various different transport mechanisms such as the internet, CD, USB memory stick, hard drive, digital and analogue discs keeping track of each item is very difficult without affecting the experience for the intended recipient. This is nowhere more of an issue than the online illegal sharing of music and video which is currently costing the creative industries many millions of pounds per year.
To overcome this, the present invention proposes to uniquely watermark each copy of the audio whether it is on it's own or part of a video in an efficient scalable way and to search the internet for possible watermarked (protected by the system) copies. The invention provides the ability to decode the watermark within the audio of a supplied file either from the internet or uploaded from another source (such as USB stick, CD, hard drive or any other medium capable of carrying audio or video) and to pin point the person that the copy was originally delivered to thus identifying the responsible party for making it available through the internet or other transport means.
The invention provides all the tools necessary to protect copies of the audio and video files within it's protection. The delivery of the files which is discussed in more detail later in this section creates a record of every transaction against each unique watermark. The invention searches many online sites known for giving access to copyrighted files and is able to alert the content owner to each suspected occurrence. The content owner is then able to load the suspected file indicated or indeed a file from any other source into the system. In some cases the system will be able to automatically download the suspected file to process making the system completely automatic. The system then decodes the watermark extracting the unique reference if found. By matching this with a delivery transaction record in the database it is able to feedback to the content owner the details of the end user delivered the item originally that were stored at the time of the transaction such as name, email address, phone number along with the file name, type, time it was delivered, the IP (Internet Protocol) address, the ISP (Internet Service Provider) used and the geographical location assigned to theiP address for that user. This detailed report is conclusive proof that this is the responsible party who originally received that copy of the audio or video file.
There are two main ways to control the management and delivery of the files within it's protection.
Either through the online web interface or though the API (Application programming interface). All of the features of the system are available through each different interface.
The architecture of the system uses a number of distributed servers which are each capable of securely watermarking the audio (and thus the video files) and delivering it to the end user either directly through a download or stream or indirectly through a third party (usually the clients) website, application or duplication system. Each watermarking server is able to pass the request on to the centralised watermarking server should it need to. This occurs if there is no copy of the requested file ready to serve which ensures a quick response to the download requests.
The watermarking servers each feature an algorithm to manage the caching of the audio and video files as well as to manage the processing queue efficiently. This ensures quick deliveries by pre empting the requirement for specific files as well as keeping the servers resource usage optimal.
Advantages * No special player or software is required to play the watermarked files other than that used normally to play that medium format.
* Able to integrate easily with any existing online delivery system using the API.
* Can generate copies for use in duplication systems.
* Very robust watermarking able to withstand repeated processing, audio signal degradation and even passing through an air transducer.
* Scalable to suit any application.
* Secure to the level of credit card company requirements (PCI compliant).
* Automatic searching for potential copies of protected content.
* Accurate identification of the original recipient of the copy of the content.
* Compatible with any format of audio and video * Very fast download/streaming delivery and high availability due to built in edge delivery architecture ensuring every request is dealt with by the nearest node in the network.
An example of the invention will now be described by referring to the accompanying drawings.
Figure 1 shows how an unprotected audio file is uploaded into the system which then creates watermarked copies of the original file. The system creates unique watermarks for each copy of the file and is able to output the file in many different formats including mp3, mp4, way, aiff. The unique watermark is recorded in the database against the details of the person who has downioaded that copy. If the user downloads multiple copies each copy will have a different watermark allowing the system to be able to pinpoint the time, location, IP, ISP of every download.
The drawing in Figure 1 shows 2 examples of how the downloads may be delivered. Two of the downloads occur through the direct download interface which is described in more detail in Figure 2.
The third download is done through a third party site such as a digital music store or a music promotion system which might be delivering music for promotional purposes. The download in this case is done using the API which records the details of the recipient to the copy of the file and delivers the file. The API can be used in 2 different ways. Either delivering on demand or pre-emptive caching which is covered in Figure 3.
Figure 2 shows how the system can be used to deliver direct download via an email to the intended recipient. An email is generated and sent to the user containing a list of the tracks they have been sent as well as a supporting message which can include images. The email contains a unique link which is a secure web address to a download page. On clicking this the user is shown a secure webpage listing the tracks. The page allows the user to select to download each track in a specific format or to securely stream the track without downloading. The stream is delivered through a flash player allowing the user to seek easily through the tracks timeline without having to download or buffer the whole track.
Figure 3 shows that the API can be used to download and store local copies of the files ready to deliver to users of the third party site. This is a great way to allow the third party site to manage their bandwidth and speed of delivery by creating their own caching rules. Then API is then used to update the record when a file is delivered to an end user associating the details of that user against the copy delivered.
Figure 4 shows how rather than caching locally or passing the data stream for the file delivery through a third party site the user can be presented with direct links to the watermarking download and streaming servers. These act as edge servers in a content delivery network which means the downloads are always delivered from the nearest server in the network to the user and therefore the fastest. This means that the third party site benefits from the security of using the invention and no longer has to provide the download bandwidth for delivering the files to the user.
Figure 5 shows how the system caters for scalability with the use of edge servers'. In the invention they are each able to watermark files, stream and deliver direct to the end user or through the API.
As each is able to deliver a large number of files an hour scaling the system is a matter of establishing more of these edge servers. As the user clicks the download link either in an email or on a third party site their browser will request the IP address for the domain name which will be done by the DNS servers. These will use the location of the user, the load on the edge servers and other static routing factors to decide which edge server to connect the user to. This configuration also makes it easy decommission edge servers for maintenance by simply blocking them in the DNS servers.
By delivering from the nearest server in the network makes the connection time very fast and should avoid the majority of the congestion on the internet. This is mainly achieved by the setting up of peer connections to lSPs and network providers at the location of each edge server. In many cases this will mean that files are delivered direct to the user through their ISP without using a carrier in between. In addition using the peer technique ensures a high level of resilience even with multiple network failures.
Figure 6 shows how the system searches a large number of sites, file sharing systems, blogs and forums for any download links matching any of the protected items in the system. Should a new instance be detected then an alert is sent to the content owner notifying them of the new instance.
The content owner can then download the file and use the testing tool to see if the file is a copy delivered through the audio protection system. In some instances the file will be downloaded automatically and checked for a watermark providing automatic detection. The system then searches the file for a watermark. If found the system then decrypts the watermark to find the unique reference for the file. Once found this can then be used to look up the details for the person who was originally sent the copy of the file. This information is shown to the content owner allowing them to proceed as they see fit.
The key to the system is the management of the copies of audio files to ensure a fast delivery to the end user without having to store thousands of every format of a file which would use up a huge amount of resource. Therefore edge servers that do the watermarking and the delivery use logic as stated in Figure 7.
Each of the edge servers will record transactions whether they be download s or streaming requests.
These are stored on the central log database.
Another example of the invention in use would be to protect video files. This is done in exactly the same way as the audio files as it is the audio file that is watermarked. As video files without the audio track are useless in the majority of cases then this is a robust way to protect the video files.
The difference is that the video part of the file is stored in the formats it is to be delivered in and when a copy is required the video part is muxed with the audio which contains the watermark into a single file to deliver through to the user. This is shown in the diagram FigureS.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB201007311A GB2492939A (en) | 2010-05-04 | 2010-05-04 | Digitally watermarking media files and tracking to identify original recipient |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB201007311A GB2492939A (en) | 2010-05-04 | 2010-05-04 | Digitally watermarking media files and tracking to identify original recipient |
Publications (2)
Publication Number | Publication Date |
---|---|
GB201007311D0 GB201007311D0 (en) | 2010-06-16 |
GB2492939A true GB2492939A (en) | 2013-01-23 |
Family
ID=42289949
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB201007311A Withdrawn GB2492939A (en) | 2010-05-04 | 2010-05-04 | Digitally watermarking media files and tracking to identify original recipient |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2492939A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040059918A1 (en) * | 2000-12-15 | 2004-03-25 | Changsheng Xu | Method and system of digital watermarking for compressed audio |
US6804779B1 (en) * | 2000-01-10 | 2004-10-12 | Sun Microsystems, Inc. | Hierarchical watermarking of content that is distributed via a network |
US20060059560A1 (en) * | 2004-09-10 | 2006-03-16 | Montulli Louis J | Systems and methods for detecting music sharing |
US20060075243A1 (en) * | 2004-10-04 | 2006-04-06 | Lakamp Brian D | Systems and methods of providing content protection for digital video products |
US20080215889A1 (en) * | 2005-10-13 | 2008-09-04 | Koninklijke Philips Electronics, N.V. | Efficient Watermark Detection |
US20080295149A1 (en) * | 2003-11-25 | 2008-11-27 | Michael Burmester | Method and system for generating and using digital fingerprints for electronic documents |
US20090049558A1 (en) * | 2007-08-14 | 2009-02-19 | International Business Machines Corporation | System and method for tracing tardos fingerprint codes |
-
2010
- 2010-05-04 GB GB201007311A patent/GB2492939A/en not_active Withdrawn
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6804779B1 (en) * | 2000-01-10 | 2004-10-12 | Sun Microsystems, Inc. | Hierarchical watermarking of content that is distributed via a network |
US20040059918A1 (en) * | 2000-12-15 | 2004-03-25 | Changsheng Xu | Method and system of digital watermarking for compressed audio |
US20080295149A1 (en) * | 2003-11-25 | 2008-11-27 | Michael Burmester | Method and system for generating and using digital fingerprints for electronic documents |
US20060059560A1 (en) * | 2004-09-10 | 2006-03-16 | Montulli Louis J | Systems and methods for detecting music sharing |
US20060075243A1 (en) * | 2004-10-04 | 2006-04-06 | Lakamp Brian D | Systems and methods of providing content protection for digital video products |
US20080215889A1 (en) * | 2005-10-13 | 2008-09-04 | Koninklijke Philips Electronics, N.V. | Efficient Watermark Detection |
US20090049558A1 (en) * | 2007-08-14 | 2009-02-19 | International Business Machines Corporation | System and method for tracing tardos fingerprint codes |
Also Published As
Publication number | Publication date |
---|---|
GB201007311D0 (en) | 2010-06-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11755935B2 (en) | Managing information for model training using distributed blockchain ledger | |
US11507613B2 (en) | Method and system for sharing playlists | |
US7483958B1 (en) | Methods and apparatuses for sharing media content, libraries and playlists | |
KR101196097B1 (en) | Method and system for unauthorized content detection and reporting | |
US8442997B2 (en) | Method and apparatus for monitoring the distribution of electronic files | |
US8417966B1 (en) | System and method for measuring and reporting consumption of rights-protected media content | |
CN1672155A (en) | Method and device for regulating file sharing | |
US20060294571A1 (en) | Collaborative video via distributed storage and blogging | |
US20160203574A1 (en) | Method and system for detecting violation of intellectual property rights of a digital file | |
US20080288629A1 (en) | Methods, media, and systems for tracking content usage over a network | |
US8489882B2 (en) | Third-party watermarking | |
US20040024727A1 (en) | Method and system of re-sharing files with modifications | |
US7917484B1 (en) | Individualized digital tracers | |
US20220337439A1 (en) | Rights-enabled tokens for blockchain applications | |
US20080288365A1 (en) | Methods, media, and systems for payment determination | |
US10432633B1 (en) | Replacing unauthorized media items with authorized media items across platforms | |
KR20030038671A (en) | Using embedded data with file sharing | |
KR101162318B1 (en) | Image editing apparatus and image copyright protective system, and method for providing the image | |
JP2014238849A (en) | System to identify multiple copyright infringements and collecting royalties | |
US20040111604A1 (en) | Method and system for protection against unauthorized distribution of copyrighted computer files over peer-to-peer networks | |
GB2492939A (en) | Digitally watermarking media files and tracking to identify original recipient | |
JP4990823B2 (en) | Illegal content determination support system and control program for illegal content determination support system | |
US20080288504A1 (en) | Methods, media, and systems for recording and reporting content usage | |
US20130198621A1 (en) | Document Tracking System and Method | |
CN112134706A (en) | Multimedia content forwarding digital watermark tracking method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AT | Applications terminated before publication under section 16(1) | ||
S20A | Reinstatement of application (sect. 20a/patents act 1977) |
Free format text: REQUEST FOR REINSTATEMENT FILED Effective date: 20120831 |
|
S20A | Reinstatement of application (sect. 20a/patents act 1977) |
Free format text: REQUEST FOR REINSTATEMENT ALLOWED Effective date: 20120921 |
|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |