CN100335984C - Portecting content from illicit reproduction by proof of existence of complete data set - Google Patents

Portecting content from illicit reproduction by proof of existence of complete data set Download PDF

Info

Publication number
CN100335984C
CN100335984C CNB018007651A CN01800765A CN100335984C CN 100335984 C CN100335984 C CN 100335984C CN B018007651 A CNB018007651 A CN B018007651A CN 01800765 A CN01800765 A CN 01800765A CN 100335984 C CN100335984 C CN 100335984C
Authority
CN
China
Prior art keywords
data
data set
parameters
parameter
watermark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB018007651A
Other languages
Chinese (zh)
Other versions
CN1539142A (en
Inventor
M·A·埃普斯坦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koninklijke Philips NV
Original Assignee
Koninklijke Philips Electronics NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics NV filed Critical Koninklijke Philips Electronics NV
Publication of CN1539142A publication Critical patent/CN1539142A/en
Application granted granted Critical
Publication of CN100335984C publication Critical patent/CN100335984C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00884Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a watermark, i.e. a barely perceptible transformation of the original data which can nevertheless be recognised by an algorithm
    • G11B20/00898Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a watermark, i.e. a barely perceptible transformation of the original data which can nevertheless be recognised by an algorithm based on a hash function
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00884Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a watermark, i.e. a barely perceptible transformation of the original data which can nevertheless be recognised by an algorithm
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B2220/00Record carriers by type
    • G11B2220/20Disc-shaped record carriers
    • G11B2220/25Disc-shaped record carriers characterised in that the disc is based on a specific recording technology
    • G11B2220/2537Optical discs
    • G11B2220/2545CDs

Abstract

A number of data items are selected for inclusion in a data set so as to discourage a transmission of the entire set over a limited bandwidth communications path, such as the Internet. Each portion of a data set is bound to the entirety of the data set so that portions of data sets that are independently distributed can be distinguished. In the case of audio recordings, for example, the data set includes an entire album, the individual songs on the album constituting portions of this data set. By binding each song to the album, a compliant player can be configured to refuse to render items in the absence of the complete data set. In this manner, the theft of a song requires a theft of the entire album. An uncompressed digital recording of an entire album consumes hundreds of megabytes of data, and the infeasibility or impracticality of downloading hundreds of megabytes of data is expected to provide sufficient discouragement for the theft of uncompressed content material. In a preferred embodiment, a watermark is created for each section of the data sent that contains an 'entirety parameter' associated with the data set. The entirety parameter is a hash value that is based on a random number stored in the watermarks of each section. When presented for rendering, the entirety parameter is read, and the watermarks of a random selection of sections within the data set are compared to this entirety parameter to assure, with statistical certainty, that the entirety of the data set is present.

Description

A kind of decoding is from the method and apparatus of the content material in source
The present invention relates generally to the consumer electronics field, and relates more specifically to the protection of anti-reproducting content material.
There is the illegal distribution of copyright material to deprive the legitimate royalties of copyright holder, and the income of encouraging the continuation illegal distribution can be provided to the supplier of this illegal distribution material this material.Because information transmission facility that the Internet provided, have restriction such as art drawing or other and scatter the material etc. of power and be intended to the anti-content material that duplicates and be subject to extensive illegal distribution.Be used to store that the extensive distribution of audio sound-recording is become is feasible with the MP3 format of transmitting compacted voice file, because the digital audio recordings of 30 or 40 megabyte of a first song can be compressed into the mp3 file of 3 or 4 megabyte.Use can download to user's computer with this mp3 file to the typical 56kbps dial-up connection of the Internet in a few minutes.Thereby malicious parties can read song from master and legal CD, and these songs are encoded into MP3 format, and the song of MP3 coding is placed on the Internet for illegally distributing on a large scale.In addition, malicious parties can be provided for downloading the dial-in direct service of the song of MP3 coding.Can duplicate the illegal copies of the song of MP3 coding with software or hardware device subsequently, maybe its decompress(ion) being contractd, it is last for playing on traditional CD player to store the CD that can record into.
Propose some restrictions and duplicated the scheme of anti-copy content material.Secure Digital Music Initiative original works (SDMI) and other are advocated and are utilized " digital watermarking " to identify the content material of checking and approving.Disclose the technology that on electronic material, adds watermark in European patent application EP 0 981 901 " embeds auxiliary data " in signal the article, and quoted at this for reference.In watermark homologue on its paper, embed digital watermarking in the content material and be and to detect but unnoticed.For example, comprise watermark digital music recording voice playing with do not have the broadcast of the same recording of watermark in fact can't distinguish.Yet whether the watermark detection device can distinguish this two kinds of recording according to the existence of watermark.Since some content material may not be anti-copy thereby may not comprise watermark, can not utilize not existing of watermark to distinguish legal and illegal material.Otherwise, the content material that does not exist expression freely to duplicate legally of watermark.
Also can utilize other replication theme.For example; " method and system of transmission content information and relative supplementary " of European patent application EP 0 906 700 have proposed to protect by the watermark " bill " of the number of times of the material that uses the control duplicating secure technology of the material of copyright, quote at this for reference.
Add accurately duplicating of watermark material and in adding the material of watermark, duplicate watermark causing.Yet, add and be not provided at the watermark of losing of this material in duplicating in the lossy copy of watermark material and duplicate.Those that comprise SDML have utilized lossy this feature of duplicating whether to distinguish legal and illegal material according to the existence of suitable watermark at interior some protection schemes.In the SDMI standard, two kinds of watermarks have been defined: " firm " watermark and " fragility " watermark.Firm watermark is the watermark that expectation can exist in lossy the duplicating (such as the MP3 coding of audio sound-recording) of the substantive part that is designed to keep original content material.This is if duplicate the reasonable regeneration that the enough information of maintenance allows original recording, also can keep firm watermark.Otherwise lossy duplicate or other illegally alters the watermark of destruction expected in fragile watermark.
In the SDMI scheme, the existence of firm watermark represents that this content material is anti-copy, when there being firm watermark but do not exist or the watermark that destroyed corresponding fragility then represents to have altered in some way the material of this anti-copy.To be configured in accordance with the device of SDMI to refuse to regenerate band damage watermark or with detected firm watermark but there is not the material that adds watermark of fragile watermark, unless the damage of watermark or do not exist through " SDMI authentication " process and prove proper is such as the SDMI compression for the anti-copy material that uses on portable music player.For ease of reference with understanding, use noun " regeneration " to comprise any processing or the transmission of content material here, such as play, record, change, verify, store, load, etc.This scheme is used for the distribution of the content material of restricted passage MP3 or other compress technique, but does not influence the distribution of duplicate of the not change (compression) of the forgery of content material.This limited protection is considered to viable commercial, because download the attempt that a great file obtains cost with the unpressed content material of inconvenience meeting contusion theft of a first song.
The objective of the invention is protection with the anti-copy material extends to and comprises the unpressed content material of protection.This and other purpose is achieved in that promptly the data item of selecting to be included in enough numbers that data concentrate, thereby defeats the attempt of the whole data set of transmission on such as finite bandwidth communication paths such as the Internets.The each several part of data set is bundled on this whole data set so that can distinguish the part of the data set of independent distribution.For example in the situation of audio sound-recording, this data set comprises whole collection of records, and the first song of the list on the collection of records constitutes the part of this data set.By each song is bundled on this collection of records, the player that can will be obedient to is configured to refusal regeneration project when not having complete data set.In this way, steal a first song and need steal whole collection of records.The unpressed digital recording of whole collection of records expends hundreds of megabytes of data, and infeasibility or unrealistic property that hundreds of megabytes of data are downloaded in expectation are enough to defeat the not theft of compressed content material.In a preferred embodiment, comprise the watermark of " univers parameter " related with this data set for each section foundation of data set.This univers parameter is based on the hashed value of the random number in the watermark that is stored in each section.When regeneration is provided, reads this univers parameter, and watermark and this univers parameter comparison selected at random of the section in the data set are guaranteed to exist complete data set with statistics certainty.
Illustrate in greater detail the present invention with reference to accompanying drawing and with example, in the accompanying drawing:
Fig. 1 explanation is according to the example system that is used to protect the anti-copy content material of the present invention.
Fig. 2 explanation determines to exist the sample data structure of whole data set according to convenience of the present invention.
Fig. 3 explanation is set up the example flow diagram that data set and the parameter of following conveniently determine to exist the scrambler of whole data set according to of the present invention.
Fig. 4 explanation is according to the example flow diagram of the demoder of the data item of the playback of data collection of the existence that depends on whole data set of the present invention.
In institute's drawings attached, identical label indication similar or characteristic of correspondence or function.
Make theft compare the more time-consuming or effort of the value of the article of being stolen and to prevent that article are stolen.For example, protect little valuables with the proof box of bolted usually, because the burglary insurance case needs the strength of spend to surpass the expectable gained of burglary insurance case usually.
Depend on network load and other factors, the MP3 required time of coding of using the 56kbs modulator-demodular unit to download general song from the Internet approximately is 15 minutes.Though perhaps can not be to downloading concrete " values " of duration definition, believe that many people can be ready to bear 15 minutes download duration and receive a first interested song.On the other hand, the incompressible digital recording of downloading song as the monic with the 56kbs modulator-demodular unit approximately needs two hours, believes that few people can be ready to bear two hours and download the duration and receive a first interested song.Though someone may bear two hour download time occasionally and receive a first song, expect that the possibility of downloading the prevalent means that becomes theft one first song in two hours is minimum.For this reason, traditional protection scheme once was based on and utilizes firm combination with watermark fragility discussed above to identify the requirement of copy of the compression of shielded material.
Reference and understanding for convenience used " free of losses " and " compression " two speech here as synonym.Whether apparent for the those of ordinary skill in the present technique, it is irrelevant whether the present invention and the information of being transmitted are compressed, and have loss irrelevant with compression.Here use word " compression " and " unpressed "; because exist the traditional solution that is used to detect such as lossy codings such as MP3, and be exactly that the compression degree that lossy coding reaches of MP3 has made and scatters shielded material and become convenient on a large scale.Known in the present technique, exist break-even compression.Yet the free of losses compression scheme does not reach common the contract data that reached of decompression that diminish to be reduced, and does not think that in order to understand purpose of the present invention fully " compression " and " unpressed " distinguish to some extent.
Also be for the ease of understanding, be here the context of the song of the digital recording that can download from the Internet, propose of the present invention.Apparent for the those of ordinary skill in the present technique, the present invention is applicable to the information of expection via any record of finite bandwidth communication path transmission.For example, single content material item can be the data recording in the larger data storehouse, rather than the song in the collection of records.
The possibility expectability of someone illegal download song was inversely proportional to for the time required with realizing download.Prerequisite of the present invention is that hypothesis exists a certain threshold value and downloads the duration, thinks more than the threshold value that at this expected revenue loss that is caused by illegal download is acceptable.Can carry out experiment and observe the download duration determine to be enough to defeat the illegal download song, can estimate that perhaps this defeats duration and may be on 1/2 to 1 hour the order of magnitude.This is, if the duration " many " illegal download of popular song less than half an hour, might appear, and if the duration greater than one hour, even illegal download appears in this song very popular also " seldom ".
Can obtain along with development of technology reaches the becoming of communication plan of selecting fully, expection can reduce downloads the required time of unpressed file.For example, depend on network load and other factors, use DSL or cable to be connected on the Internet, will transmit the required time decreased of a first unpressed digital song to being less than 5 minutes.As noted above, the protection scheme that great majority exist can not be distinguished the free of losses copy and the original copy of numerical data.Therefore, in the high speed data transfer environment, the possibility expection meeting of the revenue losses that is caused by the unpressed digital song of illegal download obviously increases.
According to the present invention, the first song of list on compact-disc (CD) or other medium is bundled on the whole contents of CD, and the broadcast that will be obedient to or recording device are configured to the single first song of refusal regeneration when not having the complete content of this CD.Even on DSL and cable modem speed, download required time of whole collection of records on the CD with compressed digital form not, depend on network load and other factor, expectability is greater than one hour.Thereby by requiring to exist the whole contents of CD, on " download " cost more than hour, the possibility of stealing a first song via the extensive distribution on the Internet greatly reduces.
Fig. 1 explanation is according to the example block diagram of protection system 100 of the present invention.Protection system 100 comprise with content material be encoded to scrambler 110 on the medium 130, and from the medium 130 demoder 120 of reproducing contents material.Scrambler 110 comprises from the selector switch 112 of source chosen content material, and with the register 114 of this stores record to the medium 130.For example selector switch 112 can be configured to select content information corresponding to being edited into the song in the collection of records.Register 114 utilizes that technology public in the present technique suitably formats, coding and canned data be on medium 130.
According to the present invention, scrambler 110 comprises selector switch 112 selected every bundled devices on the whole 116 that register 114 is recorded in the information on the medium 130 that are bundled into.In general, be stored in the information composition data item on the medium 130, be stored in the whole composition data collection of information on the medium 130, and each data item be bundled on the data set.
Comprise regenerator 122 and be subjected to the door 124 of overall inspection device 126 control according to demoder 120 of the present invention.Regenerator 122 is configured to from such as CD reader 132 retrieving informations such as device such as medium reading such as grade.As commonly used in the present technique, regenerator 122 comes retrieving information by the assigned address index, and as replying, reader 132 provides and is positioned at the data on this appointed positions index on the medium 130.Realize on the medium becoming reading of blocks of data on the continuous position by assigned address index and block size.
The dotted line illustrated example song withdrawal device 142 of Fig. 1 extracts song and it is passed to example CD simulator 144 from medium 130, and expression is by the possible illegal download of the song of the Internet.For example, the traditional CD read command of CD simulator 144 expression responses provides the software program of information.As an alternative, the information that receives from the song withdrawal device can be write on the CD medium, and be offered traditional C D reader 132.Point out as top, might use song withdrawal device 142, because the whole content of hypothesis transmission medium 130 is that the autotelic extensive content that is subjected to medium 130 hinders.
According to the present invention, overall inspection device 126 is configured to obtain data by regenerator 122 from medium 130 usually, determine whether to exist whole data set.Can utilize the technology miscellaneous of any number general in the present technique to check the existence of whole data set.For example, by calculation check on regenerator 112 obtainable data item and and with this verification and with corresponding to the verification of the original overall of this data set with compare, can utilize corresponding to the verification of the data item of data centralization and check all data item all to exist.Can it be transmitted with data set, and prove with key subsequently in this verification and last digital signature.
In scope such as consumer devices such as audio frequency CD playing devices, based on verification and method may be impracticable.Vicissitudinous decoding scheme when audio CD player comprises error correction and the each reading of other permission CD.For example, audio CD player there is no need accurately to begin the song that plays a song on same point.Similarly, if detect mistake when reading CD, substitute vicious joint with repeating last joint usually.A few bytes when song begins changes or the byte that repeats to be equivalent to millisecond can not cause noticeable sense of hearing difference, but exist these bytes the verification related with this song with on have great influence.
Watermark and corresponding watermark detection equipment disposition become to provide accurate and read with watermark repeatably in various environment.For example, on than the lower in fact bit rate of the bit rate of recorde audio signal, write down watermark usually, and adopt the watermark of redundant recording further to promote and read the likelihood of exact value as watermark.Point out as top, usually by bit rate that changes the record watermark and the soundness that redundance can change watermark.Even " fragile " watermark also is configured to stand minor variations common when traditional consumer CD playing device reads information usually with unusual.As used herein, watermark one speech comprises one or more watermark encoder: a watermark can comprise for example a fragile component and a firm component.Depend on watermark generation method, these components can be embedded in the joint independently, or as public entity.Understand for convenience, noun watermark, fragile watermark and firm watermark are irrespectively to use with the method for concentrating in the watermark generative process or separate single component here.
Fig. 2 illustrate convenient check exist raw data set integral body be used for sample data structure 200 at the data centralization storing data item.Show the road 210 and joint 220 structures that conform to traditional C D and other storage medium.In a preferred embodiment, this data set is self-reference: data set comprises one or more parameter of other member's that can be used for checking this data set existence.In sample data structure 200, that gives data set respectively saves 220 random value R (i) 234.Preferably conduct " band is outer " data (OBD) the 240 respectively hash H of this random value R (i) (R (i)) are stored on the medium.For example, these data 240 can be stored in the contents table of typical C D, as " CD-ROM " data among mixed audio-data CD, as independently with unique data section, as the pseudo-song that only comprises data, or the like.Utilize hash H (H (R0), H (R1) ... H (Rn)) hash of 240 combination is as the test value CHK of the globality of set of identification data.Test value CHK232 and random value R (i) 234 constitute with this data set respectively save 220 related watermarks 230.This is, in a preferred embodiment, the CD130 of Fig. 1 forms with the identifier CHK232 with the integrality that comprises the data set on the CD and joint 220 of each record of saving the watermark 230 of 220 sign random number 234.Adopt hashed value to be because hash is calculated normally irreversible.Can not determine the value that is used for producing hashed value, can not determine to be used for to constitute one or more the consequence of change of hashed value.(be to use " can not determine " speech on cryptographic meaning here: definite expection of this value will expend more time and the resource that can carry out than reality.) water saving seal can be firm or fragile watermark.In a preferred embodiment, test value CHK232 is as firm watermark encoder, and as shielded material, and random number R (i) the 234th is as fragile watermark encoder with the sign of guaranteeing this material.As mentioned above, firm watermark is that the watermark of writing down on lower bit rate or compare fragility has more redundance.Change a kind of saying, fragile watermark expends less resource than firm watermark.Also as mentioned above, Cui Ruo watermark provides the indication of altering that waits other form such as the compression of protected data.Test value CHK also can be the part of the hash of combination, such as lower m position.Though, storing the saving of the resource of this value less than the complete Hash value, the security of part hashed value make this reduction of security become reasonable.
The example flow diagram of the scrambler 110 of data set is set up in Fig. 3 explanation on medium according to the present invention.On 310, select data item for joining data centralization.This data item can be a first song of selecting to join in the collection of records, selects to join the data recording in the database, or the like.This data item comprises one or more data section.For example, song can be divided into a plurality of period of Denging, and each data recording can constitute single joint, etc.On 320, give each joint of this data item with random number R (i), and on 330 this data item size is being added on the accumulated size of whole data set.According to the present invention, with data item be added on the data set up to think this data set size even as big as after hindering by till this data set of finite bandwidth traffic channel.This " hinder size " is the value of a subjectivity, and depend on the available communication bandwidth of hypothesis, loss that transmission causes, or the like.Do not reach as yet if on 335, hinder size, then turn back to frame 310, select another data item for joining this data centralization by branch.Example flow at Fig. 3 is not shown, also can utilize other standard to determine whether to increase additional data items to data centralization.For example, if the song that data item is collected corresponding to already present collection of records, no matter whether the size of this data set has surpassed the obstruction size of determining, usually all songs all is added to this data centralization.Do not reach the obstruction size criteria as yet if selected all songs of collection of records collection, then select other data item to accumulate desired obstruction size.For example, the data item that comprises random data bits can be added on this data set and increase its size.These random orders are normally stored as band outer data, CD-ROM data etc., with prevent traditional CD player with it as the sound reproduction that can hear.As an alternative, these data item can be included as other collection of records of sales promotion and other sample song of providing, or image relevant with the content material that is write down and video joint.Similarly, insert such as the Internet in the information of record that targeted promotional material such as pre-booking process also can be included in recording medium.According to the present invention, the those of ordinary skill in the present technique is to understand easily to these and other measure of the size of increase data set.According to the present invention, the data item of respectively this selection is bundled on the data set, and feasible elimination or change comprise any joint, the targeted promotional material etc. at random that add for the size that increases this data set and can be used for getting rid of later on from this data set playback of data item in interior any data item.
Selecting after data item provides the data set of enough sizes, on 340 according to the combination calculation test value CHK of the random number of the joint of giving each data item.This combination can comprise such as corresponding to the verification of these random numbers and, corresponding to each random number such as the verification of functions such as hash function and etc.As mentioned above, this CHK value is the hash of the combination of random value preferably, or the part of this hash.On 350,, each of data set that comprises this CHK value and comprise the random number R (i) of giving this joint set up watermark for saving.Point out as top, preferably as this CHK value of firm watermark encoder and as fragile this random number of watermark encoder.On 360 each joint is being recorded on the medium that has this combined watermark, and on 370 the hash of the random number of each joint being stored on the medium, preferably as band outer data (OBD).By the CHK value individual data item is bundled on the whole data set in this way, and the hashed value of oneself's reference of random number that can be by being used for setting up this CHK value is checked the validity of this integrity value.In view of the disclosure, other encoding scheme that the individual data item is bundled on the data set is conspicuous to the those of ordinary skill in the present technique.
Fig. 4 explanation is configured to depend on the example flow diagram of the demoder 120 of the data item that existence regeneration such as the song of selecting of the whole data set related with this data item etc. selects.This process flow diagram hypothesis has been set up the original copy of data item and data set with the coding method of Fig. 3.If adopt another binding scheme, the those of ordinary skill in the present technique can suitably be revised the example flow diagram of Fig. 4 according to this exemplary embodiment.The flow process of supposing Fig. 4 is being called when judging that such as anti-copy watermark or other identifier mechanism selected data item is the anti-copy item by detecting.On 410, the hashed value that respectively saves associated random number of the data item that reading of data is concentrated from the medium, it can be from the reading of the true copies of the content material of record (Fig. 1 130), perhaps from illegal source (Fig. 1 144).On 420, with Fig. 3 340 on used same algorithm produce CHK value in watermark of each joint of the true copies that is included in content material according to the combination calculation hash of these hashed values.On 430, select the joint at random of this data set, and the test value that reads this watermark on 440 is as CHK '.As an alternative, the first segment of selecting to be used to verify can be from the joint in the data item of selecting to be used to regenerate, and is the part of raw data set so that verify selected data item immediately.In the context of the song of recording, data section saved corresponding to 15 seconds of song usually.On 455, if the test value CHK that calculates is not equal to the test value CHK ' that reads, indication is to the modification of the set of the hash of random number, and decoder configurations becomes this content material of refusal regeneration on 480.
For verify not substantial modifications of this data section, on 450, read give at random the joint Sx that selects random number as R ' (x).As mentioned above, this random number preferably is stored in the fragile watermark, and fragile watermark is characterised in that damage or the destruction that the substantial modifications to the data that comprise this watermark can cause this fragile watermark.On 450, also calculate the hash H (R ' (x)) of the random value read, and this hash H (R ' (x)) is compared with the corresponding hashed value H ' that reads and be used for subsequently setting up compliance test value CHK on frame 410 (R (x)).If these two hashed values do not match on 455, decoder configurations is become this content material of refusal regeneration on 480.If these two Hash value matches then can be tested other joint similarly by circulation 465-430, up to drawing this content material and not till the abundant confidence level of its true copies substantial modifications.In a preferred embodiment, only test one or two joints, so that reduce the time-delay of introducing by this data set integrity proof procedure.When on 465, drawing the abundant confidence level that has whole data set, the just selected song of regeneration on 470.Apparent for the those of ordinary skill in the present technique, can implement additional compliance test subsequently.Best, the time verify the watermark of each joint of selected song at each joint that reads this song, so that saving, each that is included in that each the CHK ' value in each joint verifies this song corresponding to compliance test value CHK by check be effective member of raw data set.
Principle of the present invention above only has been described.Thereby should understand person skilled in the art person's various configurations of design of having the ability,, but still embody principle of the present invention here, thereby within its spirit and scope though do not describe clearly or show them.The each several part of the material that the example explanation that for example, proposes is above write down is the part of data set.In another embodiment, for the purpose of efficient, can be with the selection portion of data item of selecting or the data item composition data collection of assigning to.For example, the tail end of song can not be the part of defined here " data set ", because the watermark process can be based on the fixing block size of each watermark or each redundant copies of watermark.For example, if the reliable embedding of watermark or other parameter needs 10 seconds record, then the remainder of ((length of song) mod (10 seconds)) can be recorded on the medium, but not be included in " data set " of checking its integrality.In a similar fashion, some targeted promotional material can be included on the recording medium, but get rid of outside data set consciously, so that can freely copy whenever and wherever possible and regenerate them.Notice that example flow diagram also is to propose for convenience of understanding, the concrete layout and the sequence of step propose for explanation.For example, in order to determine consistance simple equation is shown in decision box, yet depends on the particular technology of these parameters that are used to encode or decode, whether the item that is read can comprise pilot process miscellaneous corresponding to the judgement of the item of determining.Can comprise in these processes such as testing and whether judge two values " enough approaching " contains consistance according to specific key deciphering, fuzzy logic or statistics, and like that.According to the present invention, suchlike distortion is conspicuous for the those of ordinary skill in the present technique, and they are included among the spirit and scope of following claim.

Claims (16)

1. a decoding is from the method for the content material in source, this content material is included among the self-reference data set, this data set comprises a plurality of data item and helps to determine the one or more the parameters whether integral body of described a plurality of data item exists that described method comprises:
Whether the integral body of determining (410-465) described a plurality of data item exists on this source, this is determined be by:
Read (440) described one or more parameters,
Read (410) described a plurality of data item,
Determine (420) one or more parameters from a plurality of parameters (240) corresponding to described a plurality of data item, and
More described one or more parameters that read and the described one or more parameters that are determined, and
Whether the integral body according to described a plurality of data item exists in decoding (470) this content material on this source.
2. method as claimed in claim 1, wherein
Described one or more parameter comprises the hashed value corresponding to described a plurality of data item, and
Described one or more parameters determine to comprise the hashed value of calculating corresponding to these a plurality of parameters (240).
3. method as claimed in claim 1, whether the integral body of wherein determining (410-465) described a plurality of data item exists also comprises:
From each selection that constitutes this content material, read (450) identification parameter (234), and
Every identification parameter (234) of this selection and identifier based on the respective items parameter of these a plurality of parameters (240) are compared (455).
4. method as claimed in claim 3, wherein:
These a plurality of parameters (240) comprise a plurality of hash parameters,
Each hash parameter of these a plurality of hash parameters is corresponding to the hash of the every identification parameter (234) that constitutes this content material.
5. method as claimed in claim 1 wherein embeds in described one or more parameters (232) at least one as watermark (230).
6. method as claimed in claim 1, wherein whether the integral body of definite this content material exists on this source and comprises:
Read (410) a plurality of joint hash parameter (240) from this source,
Calculate (420) integral value according to these a plurality of joint hash parameters (240),
Select at least one selection joint (220) of (430) this content material,
Read (440) this at least one watermark value that saves at random (232) from this source, and
This integral value and this watermark value (232) are compared (445).
7. method as claimed in claim 6, whether the integral body of wherein determining this content material is present on this source also comprises:
Read second watermark value (234) of (450) this at least one selection joint (220) from this source,
This second watermark value (234) of hash (450) reaches to produce the watermark value of hash
With the watermark value of this hash with save the hash parameter corresponding to of this at least one this a plurality of joint hash parameters (240) that save at random and compare (455).
8. method as claimed in claim 1 the method have been applied to decoding and being included in content material among the self-reference data set, wherein:
Each data item comprises one or more data section (220),
Each data section of this one or more data section (220) has related joint parameter (234), and
Described one or more parameter comprises a univers parameter (232) corresponding with described a plurality of data item, and this univers parameter comprises the hash of the combination of the joint parameter (234) related with one or more data section (220) of each data item.
9. demoder (120) that is used for the decode content material, this content material is included among the self-reference data set, this data set comprises a plurality of data item and helps to determine the one or more the parameters whether integral body of described a plurality of data item exists that this demoder comprises:
Regenerator (122) is configured to receive the data item (210) that is included among the self-reference data set, and therefrom produces the regenerate corresponding at least one data item (210), and
Overall inspection device (126), operationally be coupling on the regenerator (122), be configured to according to whether existing whole data set to get rid of the regeneration of this at least one data item (210), whether this overall inspection device (126) is configured to not exist in order to the integral body of checking described a plurality of data item, this check be by:
Read (440) described one or more parameters,
Read (410) described a plurality of data item,
Determine (420) one or more parameters from a plurality of parameters (240) corresponding to described a plurality of data item, and
More described one or more parameters that read and the described one or more parameters that are determined.
10. demoder as claimed in claim 9 (120), wherein this overall inspection device (126) further is configured to:
From constitute this data set the item each options read identification parameter (234), and
Every identification parameter (234) of item options and identifier based on the respective items parameter of these a plurality of parameters (240) are compared.
11. as the demoder (120) of claim 10, wherein
This univers parameter (232) comprises the hash parameter corresponding to this data set, and
This integral value comprises the hashed value corresponding to these a plurality of parameters (240).
12. as the demoder (120) of claim 10, wherein these a plurality of parameters (240) comprise a plurality of hash parameters, each hash parameter of these a plurality of hash parameters corresponding to the hash of every related value of the item of this data set.
13., wherein at least one univers parameter (232) and these a plurality of parameters (240) are encoded into one or more watermark (230) that embeds this data centralization as the demoder (120) of claim 10.
14. as the demoder (120) of claim 13, wherein this one or more watermark (230) comprises:
Firm watermark is configured to make and eliminates the destruction that this firm watermark will cause this contiguous items, reaches
Fragile watermark is configured to the destruction that makes this contiguous items of modification will cause this fragile watermark.
15. demoder as claimed in claim 9 (120), wherein this overall inspection device (126) is configured to:
First from data item (210) is read first data set identification (232),
Second from data item (210) is read second data set identification (232), and
Get rid of this regeneration of second at least according to the correspondence between this first data set identification (232) and second data set identification (232).
16. demoder as claimed in claim 9 (120), this demoder are applicable to that decoding is included in the content material among the self-reference data set, wherein:
Each data item comprises one or more data section (220),
Each data section of this one or more data section (220) has related joint parameter (234), and
Described one or more parameter comprises a univers parameter (232) corresponding with described a plurality of data item, and this univers parameter comprises the hash of the combination of the joint parameter (234) related with one or more data section (220) of each data item.
CNB018007651A 2000-02-01 2001-01-30 Portecting content from illicit reproduction by proof of existence of complete data set Expired - Fee Related CN100335984C (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US17895500P 2000-02-01 2000-02-01
US60/178,955 2000-02-01
US53781500A 2000-03-28 2000-03-28
US09/537,815 2000-03-28

Publications (2)

Publication Number Publication Date
CN1539142A CN1539142A (en) 2004-10-20
CN100335984C true CN100335984C (en) 2007-09-05

Family

ID=26874847

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB018007651A Expired - Fee Related CN100335984C (en) 2000-02-01 2001-01-30 Portecting content from illicit reproduction by proof of existence of complete data set

Country Status (14)

Country Link
EP (1) EP1314156A2 (en)
JP (1) JP2003529790A (en)
KR (1) KR100753969B1 (en)
CN (1) CN100335984C (en)
AU (1) AU784650B2 (en)
BR (1) BR0104299A (en)
CA (1) CA2369082A1 (en)
CZ (1) CZ20013509A3 (en)
EA (1) EA005605B1 (en)
IL (1) IL145662A0 (en)
NO (1) NO20014737L (en)
PL (1) PL364770A1 (en)
UA (1) UA70360C2 (en)
WO (1) WO2001057869A2 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7228425B1 (en) 2000-02-07 2007-06-05 Koninklijke Philips Electronics N. V. Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections
GB0110132D0 (en) * 2001-04-25 2001-06-20 Central Research Lab Ltd System to detect compression of audio signals
US7194617B2 (en) * 2001-11-05 2007-03-20 Koninklijke Philips Electronics N.V. Method and apparatus to prevent the unauthorized copying of digital information
AU2003202778A1 (en) * 2002-03-06 2003-09-16 Koninklijke Philips Electronics N.V. Double watermarks
WO2003096337A2 (en) * 2002-05-10 2003-11-20 Koninklijke Philips Electronics N.V. Watermark embedding and retrieval
US8024808B1 (en) * 2002-08-07 2011-09-20 Cisco Technology, Inc. Arrangement for controlling content distribution by dynamically controlling bandwidth for transfer of the content based on content authorization
CN1768386A (en) * 2003-04-08 2006-05-03 皇家飞利浦电子股份有限公司 Fragile audio watermark related to a buried data channel
CN106250729B (en) * 2016-08-01 2020-05-26 腾讯科技(深圳)有限公司 Song data processing method and equipment thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0840513A2 (en) * 1996-11-05 1998-05-06 Nec Corporation Digital data watermarking
CN1220756A (en) * 1997-01-27 1999-06-23 皇家菲利浦电子有限公司 System for copy protection of recorded signal
CN1220805A (en) * 1997-01-27 1999-06-23 皇家菲利浦电子有限公司 Method and system for transferring content information and supplemental information relating thereto
WO1999045704A2 (en) * 1998-03-04 1999-09-10 Koninklijke Philips Electronics N.V. Watermark detection

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6449377B1 (en) * 1995-05-08 2002-09-10 Digimarc Corporation Methods and systems for watermark processing of line art images
US5611066A (en) * 1994-02-28 1997-03-11 Data/Ware Development, Inc. System for creating related sets via once caching common file with each unique control file associated within the set to create a unique record image
US5946396A (en) * 1996-10-25 1999-08-31 Intel Corporation System and method for ensuring integrity of audio
US6185312B1 (en) * 1997-01-28 2001-02-06 Nippon Telegraph And Telephone Corporation Method for embedding and reading watermark-information in digital form, and apparatus thereof
WO1999053428A1 (en) * 1998-04-16 1999-10-21 Digimarc Corporation Digital watermarking and banknotes
US6226618B1 (en) * 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
US6389403B1 (en) * 1998-08-13 2002-05-14 International Business Machines Corporation Method and apparatus for uniquely identifying a customer purchase in an electronic distribution system
US6748533B1 (en) * 1998-12-23 2004-06-08 Kent Ridge Digital Labs Method and apparatus for protecting the legitimacy of an article
JP2001067792A (en) * 1999-08-30 2001-03-16 Sony Corp Device and metod for recording and recording medium
TW563037B (en) * 2000-01-20 2003-11-21 Ibm Digital content distribution using web broadcasting services
US6986048B1 (en) * 2000-01-24 2006-01-10 Koninklijke Philips Electronics N.V. Protecting content from illicit reproduction by proof of existence of a complete data set using security identifiers
JP2003521791A (en) * 2000-02-07 2003-07-15 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Content protection from illegal duplication
US7228425B1 (en) * 2000-02-07 2007-06-05 Koninklijke Philips Electronics N. V. Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0840513A2 (en) * 1996-11-05 1998-05-06 Nec Corporation Digital data watermarking
CN1220756A (en) * 1997-01-27 1999-06-23 皇家菲利浦电子有限公司 System for copy protection of recorded signal
CN1220805A (en) * 1997-01-27 1999-06-23 皇家菲利浦电子有限公司 Method and system for transferring content information and supplemental information relating thereto
WO1999045704A2 (en) * 1998-03-04 1999-09-10 Koninklijke Philips Electronics N.V. Watermark detection

Also Published As

Publication number Publication date
IL145662A0 (en) 2002-06-30
NO20014737L (en) 2001-11-30
UA70360A (en) 2004-10-15
WO2001057869A2 (en) 2001-08-09
KR100753969B1 (en) 2007-08-31
CZ20013509A3 (en) 2002-03-13
EP1314156A2 (en) 2003-05-28
WO2001057869A3 (en) 2003-03-13
NO20014737D0 (en) 2001-09-28
UA70360C2 (en) 2004-10-15
CA2369082A1 (en) 2001-08-09
AU4411601A (en) 2001-08-14
PL364770A1 (en) 2004-12-13
AU784650B2 (en) 2006-05-18
KR20020006693A (en) 2002-01-24
EA200101034A1 (en) 2003-06-26
EA005605B1 (en) 2005-04-28
BR0104299A (en) 2002-01-08
JP2003529790A (en) 2003-10-07
CN1539142A (en) 2004-10-20

Similar Documents

Publication Publication Date Title
US7587603B2 (en) Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections
CN1185653C (en) Protecting content from illicit reproduction by proof of existence of complete data set using security identifiers
CN1454339A (en) Confirming the existence of a complete data set under multiple control scenarios
US6865676B1 (en) Protecting content from illicit reproduction by proof of existence of a complete data set via a linked list
CN100335984C (en) Portecting content from illicit reproduction by proof of existence of complete data set
US20020144130A1 (en) Apparatus and methods for detecting illicit content that has been imported into a secure domain
CN1214383C (en) Protecting content from illicit reproduction
CA2763025A1 (en) Secure copy and/or playback protection
EP1444694A1 (en) Method of and apparatus for preventing illicit copying of digital content
US20020183967A1 (en) Methods and apparatus for verifying the presence of original data in content while copying an identifiable subset thereof
KR20030007737A (en) Methods of attack on a content screening algorithm based on adulteration of marked content
US20020199107A1 (en) Methods and appararus for verifying the presence of original data in content
MXPA01010005A (en) Protecting content from illicit reproduction by proof ofexistence of a complete data set

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20070905

Termination date: 20120130