TW535406B - Method and apparatus to determine ""original"" copyright infringer of web documents via content transcoding - Google Patents

Method and apparatus to determine ""original"" copyright infringer of web documents via content transcoding Download PDF

Info

Publication number
TW535406B
TW535406B TW89118707A TW89118707A TW535406B TW 535406 B TW535406 B TW 535406B TW 89118707 A TW89118707 A TW 89118707A TW 89118707 A TW89118707 A TW 89118707A TW 535406 B TW535406 B TW 535406B
Authority
TW
Taiwan
Prior art keywords
watermark
document
request
information
patent application
Prior art date
Application number
TW89118707A
Other languages
Chinese (zh)
Inventor
Thomas Alexander Bellwood
Rabindranath Dutta
Seth Aaron Eilbott
Christian Lita
Matthew Francis Rutkowski
Original Assignee
Ibm
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ibm filed Critical Ibm
Application granted granted Critical
Publication of TW535406B publication Critical patent/TW535406B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3204Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium
    • H04N2201/3205Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium of identification information, e.g. name or ID code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3204Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium
    • H04N2201/3207Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium of an address
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3212Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a job, e.g. communication, capture or filing of an image
    • H04N2201/3214Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a job, e.g. communication, capture or filing of an image of a date

Abstract

Upon receiving a request for a document, recipient-specific identifying information for the requester is secured, including at least the TCP/IP address(es) of the client being utilized by the requester and the proxy, if any, transmitting the request from the client, and optionally including client authentication information such as userid and password or HTTP request header information such as authorization header information, ""From"" header information, proxy-authorization information, and user-agent header information. The recipient-specific identifying information is then compared to a watermark database for the requested document. If a match is found, the associated unique watermark is retrieved from the database. If no match is found, a unique watermark is generated for the document and associated with the recipient-specific identifying information in a new entry within the watermark database for the document. The watermark is employed to generate a uniquely watermarked version of the requested document, with the watermarked version being returned in response to the request. Subsequently, when an infringing copy of the document is located, the infringing copy is compared to the original, unwatermarked version of the document to extract the watermark. The extracted watermark is then looked up in the watermark database for the document to determine the ""original"" copyright infringer, and the associated recipient identifying information is retrieved.

Description

535406 五、發明說明(1) mu 發明背景 本舍明概言之係關於 明確地說係關於使用内容中:崔,害負責者之辨識,且 害者。更明確地說,本“ p來決定π原始”著作權侵 ”隱藏”接收者專屬資訊ς — =内容轉碼來喪人 2 ·相關技術說明·· 、 7 Ρ内° 自許多產業之經濟角产爽羞,者 ^ 權之内容之複製,轉換Γ及/或值W者作以防止未經授 1 9 9 8年之齡付2專播是非常重要的。在 1998年之數位千牾著作權法案之者隹 某種活動時,關於線上務 田服務提仏者只從事 到重大限制。料看:务1者之著作權侵害之責任受 iOS-SiU)之第二條,名j :〇’】數位千禧著作權法案(公法535406 V. Description of the invention (1) mu Background of the invention The outline of the present invention is specifically about the content of use: Cui, identification of the person responsible and the victim. More specifically, this "p to determine π original" copyright infringement "hidden" receiver exclusive information ς = = content transcoding to lose people 2 · Relevant technical descriptions · · 7 内 ° Economic production from many industries It is very important to copy the content of the right, convert Γ and / or the value of W to prevent the payment of 2 special broadcasts without the age of 198 years. In the case of several thousands of copyright holders of the 1998 Act, there were only significant restrictions on online field service providers. It is expected that the responsibility of the copyright infringement of the service maker is subject to Article 2 of the iOS-SiU, named j: 〇 ’] Digital Millennium Copyright Act (Public Law

Infringe_t Uabllity Ll 广 C〇Pyright U.S.C. §512。 Ulty Umitati〇n",且編成法典於 通常決定侵權素材位於何處(例如位於 供者)相當容易’但是決定原始拷貝該侵權辛:上 該侵柘素材可自線上服務提供者取得,之泰μ 或使付 很困難。雖然著作權所有者可取得聯邦法個=Infringe_t Uabllity Ll. Coypy U.S.C. §512. Ulty Umitati〇n ", and codifying it is usually easy to determine where the infringing material is located (for example, at the donor) ', but to determine the original copy of the infringing material: the infringing material can be obtained from the online service provider. Or make payment difficult. Although copyright owners can obtain federal law =

I 是,不僅這是-耗時程,,而“使之服: 太可能成功。因此,運用—技術以 斤以此方法不 著作權違反者是必要的。Τ错由拷貝來找出”原始” ίΙ m 第8頁 535406 五、發明說明(2) 目前存在一些藉由檢查拷貝來偵出著作權侵害之方法, 其中包含一些追尋内容之任何轉換之複雜方法。但是,藉 由該等現有方法來保護著作權以獲得大量金錢補償極為困 難,因為該等方法無法區分”故意”侵害者,或藉由公開傳 播内容而造成最初侵害之個體,與”非故意”侵害者,或, 雖然技術上侵害著作權,但是在無惡意企圖之下不小心拷 貝或儲存文件之個體(例如線上服務提供者)。因為自某種 ”非故意”侵害者只可獲得受限之損害補償,所以只有對於 π故意”侵害者方可獲得重大補償與損害懲罰金。因此,在 偵測著作權侵害上可區分π故意π與π非故意π侵害者之方法 非常有用。 除此之外,隨著各種普及裝置之繁衍,網路内容經常轉 碼成為不同於内容原始受到產生之格式。通常這是用以便 利顯示於具有受限顯示功能之裝置,例如P a 1 m與W i n d 〇 w s CE裝置,無線電話,等等,但不是用於接收者之額外傳 播。為降低法律責任,轉碼伺服器需要機制以偵出轉碼之 輸出之著作權侵害者,尤其是當轉碼伺服器之所有者未擁 有受到轉碼及傳送至從屬之原始素材之著作權時。 因此,最好致能網路文件之π原始π著作權侵害者之偵 測。 發明摘要 因此本發明之一目標是提供一方法,系統’與電腦程式 產品,以辨識需對著作權侵害負責之個體。 本發明之另一目標是提供一方法,系統,與電腦程式產I am, not only that this is a time-consuming process, but "make it work: too likely to succeed. Therefore, it is necessary to use technology to avoid copyright infringers in this way. T error is to find the" original "by copying ίΙ m page 8 535406 V. Description of the invention (2) There are currently some methods to detect copyright infringement by checking the copy, including some complicated methods to track any conversion of the content. However, these existing methods are used to protect It is extremely difficult to obtain substantial monetary compensation for copyright, as these methods cannot distinguish between "intentional" infringers, or individuals who initially infringed by publicly disseminating content, and "unintentional" infringers, or, although technically infringing on copyright, However, individuals who accidentally copy or store files without malicious intentions (such as online service providers). Because only certain types of "unintentional" infringers can only obtain limited damages, so only for "intentional" infringers To obtain significant compensation and damages. Therefore, it is very useful to distinguish between π intentional π and π unintentional π infringers in detecting copyright infringement. In addition, with the proliferation of various popular devices, web content is often transcoded into a format that is different from the original content being generated. This is usually used to facilitate display on devices with limited display capabilities, such as P a 1 m and Win d CE devices, radiotelephones, etc., but not for additional transmission by the receiver. To reduce legal liability, the transcoding server needs a mechanism to detect copyright infringers of the transcoded output, especially when the owner of the transcoding server does not own the copyright that was transcoded and transmitted to the dependent original material. Therefore, it is best to enable the detection of π original π copyright infringers of network files. SUMMARY OF THE INVENTION It is therefore an object of the present invention to provide a method, system 'and computer program product to identify individuals who are responsible for copyright infringement. Another object of the present invention is to provide a method, a system, and a computer program product.

535406 五、發明說明(3) 品’以在内容 本發明之另 品,以藉由内 專屬資訊。 現在說明如 請求,則請求 含至少請求者 (等)TCP/IP 位 包含從屬驗證 標頭貧訊,例 授權資訊,與 識資訊與請求 一使用水印來決定 二目標是提供一方 谷轉碼在一文件之 原始M著作權侵害者。 法’系統,與電腦程式產 水印内嵌入”隱藏”接收者 何達成前述 者之接收者 與代理器, 址’代理器 資訊,例如 如授權標頭 使用者代理 之文件之一 匹配,則自資料庫擷取 配,則 於該文 訊。該 送回該 侵權拷 比較以 之水印 屬辨識 一旦 以及額 針對該 件之水 水印是 水印版 貝時, 抽取水,以決 資訊受 閱讀下 外目標 文件產生一 印資料庫之 用以產生請 本以回應該 侵權拷貝與 印。接著在 定”原始π著 到掏取。 列詳細書面 ,特點,與 之目標 專屬辨 如果存 傳送來 使用者資訊, 者標頭 水印責 相關之 獨特水 ° —旦 識資訊 在的話 自從屬 識別及 "來源π 資訊。 料庫雙 獨特水 印,且 新輸入項的 求之文 請求。 該文件 該文件 作權侵 說明 優點 件之一 隨後, 之原始 之水印 害者, 接收針對一文件之 受到擷取,其中包 ’所用之從屬之該 之請求,且隨意地 密碼,或HTTP請求 標頭資訊,代理器 接著接收者專屬辨 到比較。如果發現 印。如果未發現匹 使該獨特水印相關 接收者專屬辨識資 獨特水印版本,且 當找到該文件之一 ,撕水印版本受到 資料庫中尋找抽取 且相關之接收者專 則應可明瞭本發明之前述 附圖簡短說明535406 V. Description of the invention (3) The product 'is the content of another product of the present invention, with exclusive information inside. Now, if the request is made, the request contains at least the requester (etc.) TCP / IP bit contains the subordinate authentication headers, such as authorization information, identification information, and the request. One uses watermarking to determine the second goal is to provide one party with transcoding in one. The original M copyright infringer of the file. Method 'system, embedded with the "hidden" receiver in the computer program watermark, and how to reach the receiver and agent of the aforementioned one, address' agent information, for example, if one of the documents authorized by the header user agent matches, The library retrieves the match, then the message. The watermark returned for the comparison of the infringing copy is identified once and when the watermark for the piece is a watermarked version, water is extracted to determine the information received by reading the target file and a print database is used to generate the copy. In response to infringing copies and seals. Then set the original π to the extraction. List the detailed written, characteristics, and unique identification of the target. If the user information is stored and transmitted, the header watermark is responsible for the unique water. ° Once the information is present, the subordinate identification and " Source π information. Double unique watermarks in the repository, and a request for a new entry for the new entry. This file is a copyright infringement that describes one of the advantages. Then, the original watermark victim receives a capture of a file. Take, which includes the request used by the subordinate, and optionally the password, or the HTTP request header information, and the agent then uniquely identifies the comparison to the receiver. If a seal is found. If no match is found that makes the unique watermark relevant to the receiver Unique identification watermark version, and when one of the files is found, the torn watermark version is searched and extracted from the database, and the relevant recipients should be able to understand the brief description of the aforementioned drawings of the present invention

535406 五、發明說明(4) 據信為本發明之特徵之新奇特點陳述於附加之申請專利 範圍。但是,當參照附圖來閱讀一示範實例之下列詳細說 明時,應最易瞭解本發明本身,以及本發明之一較佳使用 模式,其他目標與優點,其中: 圖1展示一資料處理系統網路,其中本發明之一較佳實 例可受到建構; 圖2 A -2B是根據本發明之一較佳實例之一程序的資料流 程圖,該程序運用接收者專屬資訊來嵌入水印於一網路文 件; 圖3是根據本發明之一較佳實例之一程序的高階流程 彳_ 圖,該程序嵌入水印於一文件以決定原始著作權侵害者; 且 圖4是根據本發明之一較佳實例之一程序的高階流程 圖,該程序利用一侵權文件來決定原始著作權侵害者。 較佳實例詳細說明 現在請參看諸圖,且尤其請參看圖1,一資料處理系統 網路受到展示,其中本發明之一較佳實例可受到建構。資 料處理系統網路1 0 2包含一或更多伺服器1 0 4 - 1 0 6與一或更 多從屬108-1 10。伺服器1 04 - 1 0 6與從屬108-110運用,例 如,用於資料轉移之傳輸控制協定/網際網路協定 f (TCP/ I P),根據已知之技術經由網際網路1 1 2來互換資 料,例如超本文傳輸協定(Η TTP )請求與回應,或超本文標 記語言(HTML )資料,與伴隨之圖形影像或聲音資料。 資料處理系統網路1 0 2内之一或更多從屬,例如從屬535406 V. Description of the invention (4) The novel features believed to be the features of the invention are set out in the scope of the attached patent application. However, when reading the following detailed description of an exemplary example with reference to the drawings, it should be easiest to understand the present invention itself, as well as a preferred mode of use, other objectives and advantages of the present invention, of which: FIG. 1 shows a data processing system network Figure 2A-2B is a data flow diagram of a program according to a preferred embodiment of the present invention. The program uses receiver-specific information to embed a watermark on a network. File; Figure 3 is a high-level flow chart of a program according to a preferred embodiment of the present invention, the program embeds a watermark in a file to determine the original copyright infringer; and Figure 4 is a preferred embodiment of the present invention A high-level flowchart of a program that uses an infringing document to determine the original copyright infringer. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Referring now to the drawings, and in particular to FIG. 1, a data processing system network is shown, and a preferred embodiment of the present invention can be constructed. The data processing system network 102 includes one or more servers 104-106 and one or more slaves 108-1 10. Servers 1 04-106 are used with slaves 108-110, for example, Transmission Control Protocol / Internet Protocol f (TCP / IP) for data transfer, interchanged via Internet 1 1 2 according to known techniques Data, such as Hypertext Transfer Protocol (Η TTP) requests and responses, or Hypertext Markup Language (HTML) data, and accompanying graphic images or sound data. One or more slaves in the data processing system network 102, such as slaves

第11頁 535406 五、發明說明(5) 11 〇 ’包含一用以請求全球資訊網(” www”或只是”網路”)文 件之一瀏覽器應用。自伺服器丨〇 4或1 〇 6至從屬1 1 〇之資料 可藉由伺服器1 0 4内之轉碼伺服器應用η 6來受到轉碼。轉 碼祠服器應用1 1 6以一方式嵌入一包含接收者專屬資訊之 水^於請求之網路文件,且下文將更詳細說明該方式。 一明’看圖2 Α與2 Β ’根據本發明之一較佳實例之一程序的 =料流程圖受到展示,其中該程序運用接收者專屬資訊來 :二水印於一網路文件。在本發明中,從㈣提交一針對 件位於之Λ九(通!是,但不一定是,Ηττρ請求>,且該文 之所有往I ’比、7 ί伺服器。針對來源内容词服器内之文件 _Μ &疋藉由一轉碼代理伺服器來轉向及導引,且 該轉碼代理伺服哭,^ ^ 个科Π汉夺W 且 容成為一不同必要的話’可轉碼文件X之内 水印至請求之内1但疋,轉碼代理伺服器將總是增加一 為基礎,且該接=,且該水印包含或是以接收者專屬資訊 ip位址。 收者專屬資訊通常是請求者,從屬ci,之 轉碼代理飼服突、 用以抽取使用者之電子郵件位址),代V。員資訊(通常是 代理為抆權標頭資Page 11 535406 V. Description of the invention (5) 11 〇 ′ contains a browser application for requesting one of the files of the World Wide Web (“www” or just “Internet”) file. The data from the server 丨 〇 4 or 106 to the slave 1 1 〇 can be transcoded by the transcoding server within the server 104 using η 6. The transcoding server application 1 1 6 embeds a water file containing the receiver's exclusive information in the requested network file in one way, and this method will be explained in more detail below. Yiming 'see Figures 2 Α and 2 Β' according to a preferred embodiment of the present invention, a flow chart of the program is shown, wherein the program uses receiver-specific information to: two watermarks in a network file. In the present invention, submit a target file from 针对 nine (pass! Yes, but not necessarily, Ηττρ request >, and all of the article goes to the server of I 'than 7). Contributing to the source content Documents in the device _M & 疋 Steering and guidance through a transcoding proxy server, and the transcoding proxy server cries, ^ ^ ^ ^ Han Han won W and may become a different necessary if necessary 'transcoding The watermark within the document X is within the request1. However, the transcoding proxy server will always add one as the basis, and the connection =, and the watermark contains or is based on the IP address of the receiver's exclusive information. Usually it is the requester, subordinate ci, the transcoding agent feeds the service, used to extract the user's email address), and represents V. Information (usually an agent

第12頁 位址,且隨意地:/自文件請求取得從屬/代理器TCP/IP 訊通常是目前用於t屬驗證取得從屬資訊。取得之從屬資 碼,但不限於此福次^丁劂覽器之從屬之使用者識別與密 號碼,如果可供=汛二獨特之處理器或網路轉接器識別 服器解析HTTP喑$的話,也可取得。另外,轉碼代理伺 由運用消化存二;:Π),例:”授權”標頭資則 535406Page 12 and optionally: / Get slaves from file request / Agent TCP / IP messages are currently used to get slave information for t slave verification. Obtained subordinate information code, but not limited to the subordinate user identification and secret number of this Fuci ^ Ding browser, if available for Xun Er unique processor or network adapter identification server to analyze HTTP 喑 $ Yes, it is also available. In addition, the transcoding agent uses digestion and storage; Π), for example: "Authorization" header information 535406

訊’與使用者代理者標頭資訊(此資訊取得瀏覽器之簽 搁位)。 一旦轉碼代理伺服器取得水印所需之接收者專屬資訊, 則轉碼代理伺服器自來源伺服器擷取文件X。轉碼代理饲 服器接著產生一獨特水印W1。現在存在許多方法可用以嵌 入數位水印於文件,影像,數位視訊,等等,以進行著作 權違反之電子偵測。通常此種技術會藉由下列方式來更改 提供給接收者之資訊:附著或嵌入額外可見或潛意識不可 見之資訊於傳送之内容,以建立資料之所有者之識別。許 多该等方法提供追尋内容之額外轉換之變更。目前方法藉 由檢視拷貝可合理準確地偵測著作權侵害。 相關於水印化,亦即產生一對應於内容之所有者之水印 之一些樣本專利包含:美國專利5, 82 5, 892號,名稱為Message 'and user-agent header information (this information is obtained from the browser's sign-in space). Once the transcoding proxy server obtains receiver-specific information required for the watermark, the transcoding proxy server retrieves document X from the source server. The transcoding agent feeder then generates a unique watermark W1. There are many methods available to embed digital watermarks in documents, images, digital video, etc. for electronic detection of copyright violations. Usually this technology changes the information provided to the recipient by attaching or embedding additional visible or subconsciously invisible information to the transmitted content to establish the identity of the owner of the data. Many of these methods provide changes that seek additional conversion of content. The current method can reasonably and accurately detect copyright infringement by examining the copy. Some sample patents related to watermarking, that is, generating a watermark corresponding to the owner of the content: US Patent 5, 82 5, 892, named

Protecting Images with an Image Watermark’’ ;美國 專利5, 809, 139號’名稱為"Watermarking Method and Apparatus for Compressed Digital Video"; 美國專利5,825,892 號’名稱為ninvisible Image Watermark for Image VerificationM ;與美國專禾J 5,825,892 號’名稱為’’Systems and Methods for Secure Transavtion Management and Electronic Rights Protect ion” 。適當水印化之選擇,在某種程度上,將決 定於請求之内容(例如,影像,壓縮之數位視訊,音訊, 等等)。大多數現有之水印化演算法皆可受到修改以用於 本發明’只要该方法允許一足夠大數目之獨特水印可受到Protecting Images with an Image Watermark ''; U.S. Patent No. 5,809,139 'named " Watermarking Method and Apparatus for Compressed Digital Video "; U.S. Patent No. 5,825,892' name named ninvisible Image Watermark for Image VerificationM; And US Patent No. 5,825,892 'named' Systems and Methods for Secure Transavtion Management and Electronic Rights Protect ion '. The choice of appropriate watermarking will, to some extent, depend on the content of the request (eg , Images, compressed digital video, audio, etc.) Most existing watermarking algorithms can be modified for use in the present invention, as long as the method allows a sufficiently large number of unique watermarks to be affected.

第13頁 535406 五、發明說明(7) 產生。 為藉由一實際水印化演算法來展示本發明,美國專^ 5,8 2 5,8 9 2之方法如下文所述受到修改,且在此提及該專 利以供參考。美國專利5,8 2 5,8 9 2號附著潛意識不可見之 水印於影像,通常視影像之紋理變異程度而定具有1 %至3 % 之調變強度,其中水印適合大多數額外或隨後之影像轉 換。此建議之方法產生一遵循指定之調變強度範圍之水印 平面以致水印維持為不可見。水印平面之每一組件皆择 =指配一隨機值,且該隨機值是以一強健隨機序列與—: 疋之受度調變強度為基礎。水印平面之組件接 、曰 =始影像組件。本質上,此方法利用一高度隨=於乘 數來嵌入水印於-數位或數位化影像,ί:之 利用四強健水印化參數來形成,該四水ί該 數。π不者來選擇,且只有標記者知道該四水印y化參 1化參 印化t::產生之獨特水印之數目非常大,其中夂 獨特水印皆受到:之水卩*本發明中 連同該水印4紙玄水印是為那一接收者戶“呀 化方法:;;…錄”旦是,本發明未受限;產生 方法,其以於可產生極多獨特水印之任何其他卜印 '纹理影像::獨特水印可為,例如,包含於文:ΐ印化 气乃立 亚可根據接收者來產>±芬/$攸々 之人為 汛及音訊檔幸> α + 屋生及/或修改,與斜m马 因此,方法之延伸。 4見Page 13 535406 V. Description of the invention (7) Produced. In order to demonstrate the present invention by an actual watermarking algorithm, the method of the U.S. Patent No. 5, 8 2 5 and 8 92 is modified as described below, and the patent is mentioned here for reference. U.S. Patent No. 5, 8 2 5, 8 9 No. 2 attaches a subconscious invisible watermark to the image, usually depending on the degree of texture variation of the image, with a modulation intensity of 1% to 3%, of which the watermark is suitable for most additional or subsequent Image conversion. This proposed method produces a watermark plane that follows the specified modulation intensity range so that the watermark remains invisible. Each component of the watermark plane is selected = a random value is assigned, and the random value is based on a robust random sequence and the intensity modulation of the :::. The components of the watermark plane are connected to the image element. In essence, this method uses a height-following multiplier to embed a watermark on a -digital or digitized image, and uses the four strong watermarking parameters to form the number. π does not choose, and only the marker knows the four watermarks, y, and s, and the number of unique watermarks generated by t :: is very large. Among them, 夂 unique watermarks are all affected by: Watermark 4 paper mysterious watermark is a method for "receiving ::; ..." of the recipient household, once the invention is not limited; the method of generating any other printed texture that can generate a lot of unique watermarks Image :: The unique watermark can be, for example, contained in the text: ΐ 印 化 气 Nelia can be produced according to the recipient > ± Fen / $ 々 人 for the flood and the audio file fortunate > α + Yayoi and / Or modify, with oblique m horses, so the method is extended. 4 see

第14頁 本,"月中’轉码代理伺服器產生 〜〜〜屬c 1針 535406 五 發明說明(8) 對文件X之請求之一獨特水印W1與文件X之一獨特水印版本 。獨特水印~„與從屬^之接收者專屬資訊接著增加至 件X之一資料庫。雖然如展示範例所示是連同文件X共同 維持於來源伺服器,文件X之接收者之水印的資料庫另/外 可維持於轉碼代理伺服器,或一完全分離之裝置。接著, 文件版本X-W 1送回至從屬C1以回應針對文件乂之往农,其 二亡件版本X—Wi看起來及/或聽起來類似於原始二件χ’,/但 σ错由仔細分析以擷取水印W 1來區分。 ’、 圖2Β展示來自一不同從屬cn< 一靖屯 之產生,該水印是用以標示文件X獨^ 之版本X jVn。水印Wn,以及從屬Γ々… 送回至彳< 屬Cn 件X之資料庫。文件χ ^ ° 故屬資訊,儲存於文 ,件X之原始,無水印内容之一拷限制,且因此包含 :γ之對應輸入項,肖-些從屬之接收上標’與產生之水 t水印版本傳送至該等從屬。因為。專屬資訊,其中文 ^ ^文件之個別拷貝,受到保存,所,、、/、有水印,而非修 可大幅降低。 斤Λ文件資料庫之大小 J見在請參看圖3,根據本發明 — 二流程圖受到展示,該程序嵌乂佳實例之一程序的 始者作權侵害者。該 ρ於一文件以決定原 :針?;:文件之,且:二Γ:3:來:驟3°2展,接 4序接者前進至步驟304 來肷入水印於忒文 專屬辨識資訊,苴中 y ~3〇4展示取得接收者 址,從屬驗證資ς (等)從屬/代理器丁^/”位Page 14 This " Mid-month 'transcoding proxy server produces ~~~ belongs to c 1 pin 535406 V. Description of the invention (8) One of the requests for file X is a unique watermark W1 and one of the unique watermark versions of file X. The unique watermark ~ „and the receiver-specific information of the slave ^ are then added to one of the databases of piece X. Although shown in the display example, it is maintained on the source server together with document X, and the watermark database of the receiver of document X is another / External can be maintained on the transcoding proxy server, or a completely separate device. Then, the document version XW 1 is sent back to the slave C1 in response to the invasion of the document, the second version X-Wi looks and / Or it sounds similar to the original two pieces χ ', but σ errors are distinguished by careful analysis to capture the watermark W 1.', Figure 2B shows the generation from a different slave cn < Jingjing, the watermark is used to mark Version X jVn of document X. The watermark Wn, and the subordinate Γ々 ... are sent back to the database of 彳 < Cn, piece X. The document χ ^ ° is stored in the text, the original of file X, without watermark One copy of the content is restricted, and therefore contains: the corresponding input items for γ, the subscripts of the subordinates receive the superscript 'and the generated watermark version are transmitted to the subordinates. Because of the exclusive information, its Chinese ^ ^ individual documents Copy, save, save ,,,,,, There are watermarks instead of repairs, which can be greatly reduced. The size of the file database is shown in Figure 3. Please refer to Figure 3. According to the present invention-the second flowchart is shown. The program embeds one of the best examples of the program. The ρ is determined in a file by the original: pin?;: Of the file, and: two Γ: 3: come: step 3 ° 2 exhibition, then proceed to step 304 to enter the watermark for the script exclusive Identification information, y ~ 304 display the recipient address, subordinate verification information (etc.) subordinate / agent ^ / ”bit

例如使用者識別及密碼’及/或HTTP 535406 五、發明說明(9) 訊’例如=標頭資訊,”來源”標頭資訊,代理哭 又榷貝5fl,與使用者代理者標頭資訊。 否著前Ϊ至步驟30 6,步驟3°6展示檢查資料庫是 ”求之文件:,以是否接收者專屬辨識資訊^ 庫,且接者所進至步驟3 08,步驟30 8展示決定ΐ 收者i:貧料庫内發現相關於針對該文件之請求之取得接 ^者專屬辨識資訊的匹㉟。如果答案是肯定的,= 則進至步驟310,步驟310展示擷取矛序 辨識資訊之水印,且接著前進至步驟314、。文件貝科庫内之 如果在步驟3 〇 8未在文株咨斗止鹿& & 資訊之匹配,m此程序前進至科步庫^現;收者專屬辨識 -獨特水印,增加該獨特;之/:31,展示產生 印m ί 5 ί專貝訊相關於文件資料庫内之產生水 水印藉步驟314 ’步驟314展示運用該獨特 本,U? ’無水印版本來產生請求之文件之水印: 且接著送㈣文株夕t: Ϊ庫取或針對請求來產生, 至步驟316/牛驟31/展- 清求者。此程序接著前進 文件請求為/。^316展不此程序變為閒置,直到接收另_ 流ί Ξ G4展根據:Λ明之一較佳實例之-程序的高階 權侵^ ^,隸序利用—侵權文件來決^原始著作 權文2 始於步驟40 2,步驟40 2展示找到一 _ 前進至步驟4°4,步驟404展示。侵ί 、,、。文件,且抽取嵌入於侵權文件之水印。此程序 535406 五、發明說明For example, user identification and password 'and / or HTTP 535406 5. Invention Description (9) Message' For example = header information, "source" header information, proxy cry 5fl, and user agent header information. If not, go to step 30 6 and step 3 ° 6 to show that the check database is the "requested file": to determine whether the recipient has unique identification information ^ database, and the receiver proceeds to step 3 08 and step 30 8 to display the decision. Recipient i: A match was found in the poor library related to the identification of the receiver ’s exclusive identification information for the request for the document. If the answer is yes, then go to step 310, where step 310 displays the captured spear order identification information Watermark, and then proceed to step 314 ,. If the file matches the information in Step 3 008 in the Becocourt library & & information, this program advances to Cobb Library ^ present; Receiver-specific identification-unique watermark, increase the unique; /: 31, show the generated seal m ί 5 ί special bexun related to the generated watermark in the document database borrow step 314 'Step 314 shows the use of the unique copy, U ? 'No watermark version to generate the watermark of the requested document: and then send the text file to t: take it from the library or generate it according to the request, go to step 316 / 牛步 31 / 展-seeker. This program then advances the file The request is /. ^ 316 show this program becomes idle until receiving another _流 ί Ξ G4 exhibition is based on: one of the best examples of Λ-the higher-order rights infringement of the program ^ ^, the sequential use of-infringing documents to determine ^ original copyright 2 starts at step 40 2 and step 40 2 shows find one Go to step 4 ° 4, step 404 display. Infringe ,,,, and extract the watermark embedded in the infringing file. This program 535406 V. Description of the invention

接著剐進至步驟4〇6,步驟4〇6展示在資料庫中尋找原始文 ,之^取水印’且接著前進至步驟408,步驟4 0 8展示,當 在文件資料庫内找 收者專屬辨識資m。]:匹配時…抽取之水印之相關接 展示此程序變為閒置此J序接著前進至步驟410,步驟410 值得注意的*,二:直到找到另-侵權文件為止。 統及/或網路來說明士然一直針對一功能完備之資料處理系 理解,本f明之施發明,但是熟悉本技術領域者應可 ' 之機制肐夠以處於各種型態之一電腦可用媒 體指令之型態來散佈,且無論用以實際執行散佈之信號承Then proceed to step 406, step 406 display to find the original text in the database, ^ take watermark 'and then proceed to step 408, step 408 display, when looking for the exclusive in the document database Identification resource m. ]: When matching ... The watermark of the extracted watermark shows that the program becomes idle. This sequence then proceeds to step 410, which is worth noting *, step 2: Until another-infringing file is found. And / or the network to explain that Shi Ran has always understood that a full-featured data processing system, the invention of this invention, but those familiar with the technical field should be able to use the mechanism to be in one of various types of computer-usable media The type of instruction to disseminate, and regardless of the signal

載媒體之特定種類為何’本發明同樣適用。電腦可用媒體 之範例包含:非揮發性’硬編碼型媒體,例如惟讀記憶體 (ROM)或可抹去,電氣程式設計推讀記憶體(EEPR〇M),可 記錄型媒體,例如棘碟片,硬碟機與CD-ROM,與傳輸型媒 體,例如數位及類比通说鏈結。 、 雖然—直參照一較佳實例來特別展示及說明本發明,孰 悉本技術領域者應町暸解,在不脫離本發明之精神與;^ 之下,可對於本發明之型悲及細節實施各種變更。What is the specific type of the carrier medium? The present invention is equally applicable. Examples of computer-usable media include: non-volatile 'hard-coded media, such as read-only memory (ROM) or erasable, electrical programming read memory (EEPROM), recordable media, such as ratchet disks Movies, hard drives and CD-ROMs, and transmission media such as digital and analog links. Although-Directly referring to a preferred example to specifically show and explain the present invention, those skilled in the art should understand that without departing from the spirit and details of the present invention, ^, the type of the present invention and details can be implemented Various changes.

Claims (1)

535406 六、申請專利範圍 1 · 一種標示文件之方法,包含: 接收針對一文件之一請求; 取得該請求之接收者專屬辨識資訊; 產生針對該文件之一獨特水印; 使得產生之水印相關於該文件之一資料庫之接收者專 屬辨識資訊;與 運用產生之水印來產生該文件之一水印版本。 2 ·如申請專利範圍第1項之方法,進一步包含: 送回該文件之水印版本至提交該請求之使用者。 3 ·如申請專利範圍第1項之方法,其中取得該請求之接 收者專屬辨識資訊之該步驟進一步包含: 取得一啟始該請求之從屬之T C P / I P位址;且 取得一傳送來自該從屬之請求之代理器,如果存在的 話,的T C P / I P位址。 4 ·如申請專利範圍第1項之方法,其中取得該請求之接 收者專屬辨識資訊之該步驟進一步包含: 取得從屬驗證資訊,其中包含一使用者識別與密碼。 5. 如申請專利範圍第1項之方法,其中取得該請求之接 收者專屬辨識資訊之該步驟進一步包含: 取得HTTP請求資訊,其中包含授權標頭資訊,’’來源π 標頭資訊,代理器授權資訊,與使用者代理者標頭資訊。 6. 如申請專利範圍第1項之方法,其中產生針對該文件 之一獨特水印之該步驟進一步包含: 產生一水印平面,該水印平面具有1 -3%之像素調變強535406 VI. Scope of Patent Application1. A method for marking a document, including: receiving a request for a document; obtaining the recipient's unique identification information for the request; generating a unique watermark for the document; making the generated watermark relevant to the Recipient-specific identification information for a database of documents; and using the generated watermark to generate a watermarked version of the document. 2 · The method of claim 1 in the scope of patent application, further comprising: returning a watermarked version of the document to the user who submitted the request. 3. The method of item 1 in the scope of patent application, wherein the step of obtaining the unique identification information of the recipient of the request further comprises: obtaining a TCP / IP address of the slave that initiated the request; and obtaining a transmission from the slave The TCP / IP address of the requesting proxy, if any. 4. The method according to item 1 of the scope of patent application, wherein the step of obtaining the unique identification information of the recipient of the request further comprises: obtaining subordinate authentication information, which includes a user identification and password. 5. If the method of the scope of patent application is applied for, the step of obtaining the unique identification information of the recipient of the request further includes: obtaining HTTP request information, which includes authorization header information, `` source π header information, agent Authorization information, and user agent header information. 6. The method according to item 1 of the patent application scope, wherein the step of generating a unique watermark for the document further comprises: generating a watermark plane having a pixel modulation intensity of 1-3% 第18頁 535406 六、申請專利範圍 度;與 增加該水印平面至該文件之資料。 7 ·如申請專利範圍第1項之方法,其中運用產生之水印 來產生該文件之一水印版本的該步驟進一步包含: 運用水印來更改文件,其中無法藉由觀察或傾聽文件 來偵出水印。 8. —種決定一原始著作權侵害者之方法,包含: 回應於找出一文件之一獨特水印版本,比較該水印版 本與該文件之一原始,無水印版本,以自該水印版本中抽 取一水印; || 比較抽取之水印與該文件之一資料庫之水印;與 回應於找到抽取之水印與資料庫之一水印間之一匹 配,擷取相關於資料庫之匹配水印之接收者識別資訊。 9. 一種標示文件之系統,包含: 接收針對一文件之一請求之裝置; 取得該請求之接收者專屬辨識資訊之裝置; 產生針對該文件之一獨特水印之裝置; 裝置,以使產生之水印相關於該文件之一資料庫之接 收者專屬辨識資訊;與 運用產生之水印來產生該文件之一水印版本之裝置。〇 1 0.如申請專利範圍第9項之系統,進一步包含: 送回該文件之水印版本至提交該請求之使用者之裝 置。 1 1.如申請專利範圍第9項之系統,其中取得該請求之接Page 18 535406 6. Scope of patent application; and Add the information of the watermark plane to the document. 7. The method according to item 1 of the scope of patent application, wherein the step of generating a watermarked version of the document using the generated watermark further comprises: using the watermark to modify the document, wherein the watermark cannot be detected by observing or listening to the document. 8. A method of determining an original copyright infringer, including: in response to finding a unique watermarked version of a document, comparing the watermarked version with an original, unwatermarked version of the document, to extract one from the watermarked version Watermark; || Compare the extracted watermark with the watermark of one of the database's database; and in response to finding a match between the extracted watermark and one of the database's watermarks, retrieve recipient identification information related to the database's matching watermark . 9. A system for marking a document, comprising: a device for receiving a request for a document; a device for obtaining unique identification information of a recipient of the request; a device for generating a unique watermark for the document; a device for making the generated watermark Recipient-specific identification information related to a database of the document; and a device that uses the generated watermark to generate a watermarked version of the document. 〇 1 0. If the system of item 9 of the patent application scope further includes: returning a watermarked version of the document to the device of the user who submitted the request. 1 1. If the system of item 9 of the scope of patent application, in which the request is obtained 第19頁 535406 六、申請專利範圍 收者專屬辨識資訊之該裝置進一步包含: 裝置,以取得一啟始該請求之從屬之TCP/IP位址;與 裝置,以取得一傳送來自該從屬之請求之代理器,如 果存在的話,的TCP/IP位址。 1 2 ·如申請專利範圍第9項之系統,其中取得該請求之接 收者專屬辨識資訊之該裝置進一步包含: 裝置,以取得從屬驗證資訊,其中包含一使用者識別 與密碼。 1 3 ·如申請專利範圍第9項之系統,其中取得該請求之接 收者專屬辨識資訊之該裝置進一步包含: 裝置,以取得HTTP請求資訊,其中包含授權標頭資 訊,π來源π標頭資訊,代理器授權資訊,與使用者代理者 標頭資訊。 1 4.如申請專利範圍第9項之系統,其中產生針對該文件 之一獨特水印之該裝置進一步包含: 產生一水印平面之裝置,其中該水印平面具有1 -3%之 像素調變強度;與 增加該水印平面至該文件之資料之裝置。 1 5.如申請專利範圍第9項之系統,其中運用產生之水印 來產生該文件之一水印版本的該裝置進一步包含: 運用水印來更改文件之裝置,其中無法藉由觀察或傾 聽文件來偵出水印。 1 6. —種位於一電腦可用媒體及用以標示文件之電腦程 式產品,包含:Page 19, 535406 VI. The device for patent-specific recipient-specific identification information further includes: a device to obtain a TCP / IP address of the subordinate that initiated the request; and a device to obtain a request to transmit a request from the subordinate The TCP / IP address of the proxy, if one exists. 1 2 · If the system of item 9 of the patent application scope, wherein the device that obtains the unique identification information of the recipient of the request further includes: a device to obtain subordinate authentication information, including a user identification and password. 1 3 · If the system of item 9 of the patent application scope, wherein the device that obtains the unique identification information of the recipient of the request further includes: a device to obtain HTTP request information, which includes authorization header information, π source π header information , Agent authorization information, and user-agent header information. 14. The system according to item 9 of the scope of patent application, wherein the device for generating a unique watermark for the document further comprises: a device for generating a watermark plane, wherein the watermark plane has a pixel modulation intensity of 1-3%; And means for adding the watermark plane to the data of the document. 1 5. The system according to item 9 of the scope of patent application, wherein the device using the generated watermark to generate a watermarked version of the document further includes: a device that uses a watermark to modify the document, wherein it is impossible to detect by observing or listening to the document Out of watermark. 16. A computer program product located on a computer-usable medium and used to mark documents, including: 第20頁 535406 六、申請專利範圍 接收針對一文件之一請求之指令; 取得該請求之接收者專屬辨識資訊之指令; 產生針對該文件之一獨特水印之指令; 指令,以使產生之水印相關於該文件之一資料庫之接 收者專屬辨識資訊;與 運用產生之水印來產生該文件之一水印版本之指令。 1 7 ·如申請專利範圍第1 6項之電腦程式產品,進一步包 含: 指令,以送回該文件之水印版本至提交該請求之使用 者。 1 8 ·如申請專利範圍第1 6項之電腦程式產品,其中取得 該請求之接收者專屬辨識資訊之該等指令進一步包含: 指令,以取得一啟始該請求之從屬之TCP/ I P位址;且 指令,以取得一傳送來自該從屬之請求之代理器,如 果存在的話’的TCP/IP位址。 1 9.如申請專利範圍第1 6項之電腦程式產品,其中取得 該請求之接收者專屬辨識資訊之該等指令進一步包含: 指令,以取得從屬驗證資訊,其中包含一使用者識別 與密碼。 2 〇 .如申請專利範圍第1 6項之電腦程式產品,其中取得 該請求之接收者專屬辨識資訊之該等指令進一步包含: 指令,以取得HTTP請求資訊,其中包含授權標頭資 訊,π來源π標頭資訊,代理器授權資訊,與使用者代理者 標頭資訊。Page 20 535406 VI. Patent application scope Receives a request for one of a document's request; Gets the recipient's unique identification information for the request; Generates a command for a unique watermark of the file; Commands to make the generated watermark relevant Receiver-specific identification information in a database of the document; and instructions for using the generated watermark to generate a watermarked version of the document. 17 · If the computer program product under item 16 of the patent application scope further includes: an instruction to return a watermarked version of the document to the user who submitted the request. 1 8 · If the computer program product under item 16 of the patent application scope, wherein the instructions to obtain the identification information unique to the recipient of the request further include: Instructions to obtain a subordinate TCP / IP address that initiated the request ; And an instruction to obtain a TCP / IP address of an agent transmitting a request from the slave, if one exists. 19 9. If the computer program product under item 16 of the patent application, the instructions for obtaining the identification information unique to the recipient of the request further include: instructions for obtaining subordinate authentication information, including a user identification and password. 2 〇. If the computer program product under item 16 of the patent application scope, wherein the instructions to obtain the unique identification information of the recipient of the request further include: instructions to obtain HTTP request information, including authorization header information, π source π header information, agent authorization information, and user agent header information. 第21頁 535406 六、申請專利範圍 2 1 ·如申請專利範圍第1 6項之電腦程式產品,其中產生 針對該文件之一獨特水印之該等指令進一步包含: 產生一水印平面之指令,其中該水印平面具有1 - 3 %之 像素調變強度;與 增加該水印平面至該文件之資料之指令。 2 2.如申請專利範圍第1 6項之電腦程式產品,其中運用 產生之水印來產生該文件之一水印版本的該等指令進一步 包含: 運用水印來更改文件之指令,其中無法藉由觀察或傾 聽文件來偵出水印。Page 21 535406 VI. Scope of Patent Application 2 1 If the computer program product of scope 16 of the patent application, the instructions for generating a unique watermark for the document further include: an instruction for generating a watermark plane, where the The watermark plane has a pixel modulation intensity of 1-3%; and instructions for adding the watermark plane to the data of the document. 2 2. If the computer program product under item 16 of the patent application scope, wherein the instructions using the generated watermark to generate a watermark version of the document further include: instructions for using the watermark to modify the document, which cannot be observed or Listen to the file to detect the watermark. 第22頁Page 22
TW89118707A 1999-12-20 2000-09-13 Method and apparatus to determine ""original"" copyright infringer of web documents via content transcoding TW535406B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US46778999A 1999-12-20 1999-12-20

Publications (1)

Publication Number Publication Date
TW535406B true TW535406B (en) 2003-06-01

Family

ID=23857185

Family Applications (1)

Application Number Title Priority Date Filing Date
TW89118707A TW535406B (en) 1999-12-20 2000-09-13 Method and apparatus to determine ""original"" copyright infringer of web documents via content transcoding

Country Status (2)

Country Link
GB (1) GB2358313A (en)
TW (1) TW535406B (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7644282B2 (en) 1998-05-28 2010-01-05 Verance Corporation Pre-processed information embedding system
US6737957B1 (en) 2000-02-16 2004-05-18 Verance Corporation Remote control signaling using audio watermarks
AU2003223058A1 (en) * 2002-05-22 2003-12-02 Koninklijke Philips Electronics N.V. Method of extracting a watermark
ES2507642T3 (en) * 2002-10-15 2014-10-15 Verance Corporation Media supervision, management and information system
US20060239501A1 (en) 2005-04-26 2006-10-26 Verance Corporation Security enhancements of digital watermarks for multi-media content
GB2407465A (en) * 2003-10-24 2005-04-27 Sonic Arts Ltd Copy control and monitoring of audio and audio-visual recordings
US8020004B2 (en) 2005-07-01 2011-09-13 Verance Corporation Forensic marking using a common customization function
DE102005059139A1 (en) * 2005-12-10 2007-06-21 Arndt Seehawer A method of associating a digital content with a person
NL2006658C2 (en) * 2011-04-22 2012-10-23 Media Cowboyz B V Method and system for detecting violation of intellectual property rights of a digital file.
US9275199B2 (en) 2011-06-28 2016-03-01 Link-Busters IP B.V. Method and system for detecting violation of intellectual property rights of a digital file
US9323902B2 (en) 2011-12-13 2016-04-26 Verance Corporation Conditional access using embedded watermarks
US9106964B2 (en) 2012-09-13 2015-08-11 Verance Corporation Enhanced content distribution using advertisements
US9262794B2 (en) 2013-03-14 2016-02-16 Verance Corporation Transactional video marking system
US9251549B2 (en) 2013-07-23 2016-02-02 Verance Corporation Watermark extractor enhancements based on payload ranking
US9208334B2 (en) 2013-10-25 2015-12-08 Verance Corporation Content management using multiple abstraction layers
US9596521B2 (en) 2014-03-13 2017-03-14 Verance Corporation Interactive content acquisition using embedded codes

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6233684B1 (en) * 1997-02-28 2001-05-15 Contenaguard Holdings, Inc. System for controlling the distribution and use of rendered digital works through watermaking
US6131162A (en) * 1997-06-05 2000-10-10 Hitachi Ltd. Digital data authentication method
JP3539141B2 (en) * 1997-07-24 2004-07-07 日本電信電話株式会社 Method and apparatus for checking use condition violation of work and storage medium storing program for checking use condition violation of work
GB2332289A (en) * 1997-12-11 1999-06-16 Ibm Handling processor-intensive data processing operations
KR20010023966A (en) * 1998-07-14 2001-03-26 요트.게.아. 롤페즈 Method and apparatus for use of a watermark and a receiver dependent reference for the purpose of copy protection
GB9905777D0 (en) * 1999-03-12 1999-05-05 Univ London A method and apparatus for generating multiple watermarked copies of an information signal
KR20020041808A (en) * 1999-08-27 2002-06-03 가부시키가이샤 세라템 테크놀로지 Image distributing method and system, image data, and recorded medium

Also Published As

Publication number Publication date
GB2358313A (en) 2001-07-18
GB0029073D0 (en) 2001-01-10

Similar Documents

Publication Publication Date Title
TW535406B (en) Method and apparatus to determine ""original"" copyright infringer of web documents via content transcoding
US7756892B2 (en) Using embedded data with file sharing
US7689532B1 (en) Using embedded data with file sharing
US8250660B2 (en) Digital watermarking applications
AU2001277047B2 (en) Using embedded data with file sharing
AU2001277047A1 (en) Using embedded data with file sharing
JP2017510908A (en) Using security features with digital image files
US8032755B2 (en) Request linked digital watermarking
Abeywardena et al. VANGUARD: a blockchain-based solution to digital piracy
Domingo-Ferrer Rational enforcement of digital oblivion
JP2000331088A (en) Method and system for approval mark management
Kwok et al. Intellectual property protection for electronic commerce applications.
JP2002016891A (en) Contents use condition inspecting method, its device, and recording medium storing the program
CN112134706A (en) Multimedia content forwarding digital watermark tracking method
JP5377387B2 (en) Package file delivery system, package file delivery method for package file delivery system, package file delivery server device, package file delivery server program, package file playback terminal device, and package file playback terminal program
Nourazar et al. An optimal method for images steganography based on linear codes features
EP2012247A1 (en) Method for transmitting media data used in web sites
JP2006237687A (en) Program and user tracing device
KR101172669B1 (en) On-line watermark service system
JP3715581B2 (en) Unauthorized use prevention method and program for causing computer to perform processing in the method
WO2022024801A1 (en) Information processing device and information processing system
Pons et al. Data protection using watermarking in e-business
JP4408683B2 (en) Content certification method
WO2022193178A1 (en) Method for tracking digital watermark for multimedia content forwarding
Dierickx et al. Overview of collective licensing models and of DRM systems and technologies used for IPR protection and management

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MM4A Annulment or lapse of patent due to non-payment of fees