NL2006658C2 - Method and system for detecting violation of intellectual property rights of a digital file. - Google Patents
Method and system for detecting violation of intellectual property rights of a digital file. Download PDFInfo
- Publication number
- NL2006658C2 NL2006658C2 NL2006658A NL2006658A NL2006658C2 NL 2006658 C2 NL2006658 C2 NL 2006658C2 NL 2006658 A NL2006658 A NL 2006658A NL 2006658 A NL2006658 A NL 2006658A NL 2006658 C2 NL2006658 C2 NL 2006658C2
- Authority
- NL
- Netherlands
- Prior art keywords
- watermark
- file
- digital file
- sending
- station
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 44
- 238000009826 distribution Methods 0.000 claims description 25
- 230000009471 action Effects 0.000 claims description 5
- 238000004891 communication Methods 0.000 claims description 2
- 230000008569 process Effects 0.000 description 4
- 230000007717 exclusion Effects 0.000 description 2
- 230000007480 spreading Effects 0.000 description 2
- 238000003892 spreading Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000010348 incorporation Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000035772 mutation Effects 0.000 description 1
- 238000011895 specific detection Methods 0.000 description 1
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/105—Arrangements for software license management or administration, e.g. for managing licenses at corporate level
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/106—Enforcing content protection by specific content processing
- G06F21/1063—Personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
Description
Method and system for detecting violation of intellectual property rights of a digital file
The present invention relates to a method and system for detecting violation of 5 intellectual property rights of a digital file.
Digital files may comprise documents such as books, music, images or video recordings, games or parts thereof or other works that are subject to intellectual property rights, such as copyrights. The digital format makes it easy to copy and spread files, to 10 send them via email, to spread them via peer-to-peer networks or to make them available for download on the Internet. In some cases, intellectual property rights are paid to the owner of the file, but in a lot of cases they are not. Files and the corresponding works are then freely spread, and for the owner of the file, it is very difficult to find out where the work was initially “leaked”. Once made available to the 15 public, it is almost impossible to stop further spreading of the files, and it is also impossible to trace their origin.
Attempts have been made to stop illegal spreading (in particular downloading) of files. Besides regulations that forbid content downloading and/or sharing, encoding 20 techniques have been used that allow only users that have paid for the rights to use the content of a specific digital file to make use of that file. Digital rights management (DRM) and watermarking techniques are examples hereof.
The existing techniques however have not proven to be effective. End-users appear to 25 be very inventive in finding techniques to decode encrypted files or to break DRM
protection. Moreover, some damage, like the leaking of unreleased material, like films, books or music albums, can’t be undone.
It is therefore a goal of the present invention to find a method and system for preventing 30 violation of intellectual property rights of a digital file, that takes away the disadvantages of the prior art, and/or enables an effective detection and/or counteract of intellectual property abuse.
2
The invention thereto proposes a method for detecting violation of intellectual property rights of a digital file, comprising, the steps of (A) in a distribution channel of the digital file, digitally (dis)playing, streaming, (pre-)viewing, and/or downloading the file from a sending or streaming instance to a receiving instance, (B) adding a watermark to 5 the digital file at the sending instance prior to sending/ broadcasting the file, wherein (C) the watermark comprises at least an identifier of the receiving instance.
The distribution channel may for a book for example be from a author, via a publisher, via one or more online bookstores, to multiple end-users. For an audio recording the 10 path may lead from a producer, via a record company, via an online shop, to an end user. For a film, the path may lead from a movie company to cinema’s, and parallel to dvd-producers and to end-users. Very often films already leak before their official premiere.
15 The technique of digitally watermarking digital files is well known. Watermarks can be added in such manner that they are not (dis)played when the file is used, but still can be detected with a dedicated tool. The watermark may either be placed in a data-section of the file, or in a META section, and may be configured such that it remains detectable, even after conversion of other modification of the file.
20
The method according to the invention thus provides an anti-piracy solution that makes fingerprint/ watermark technology applicable within Internet surveillance. The invention offers the possibility to encode watermarking at different stages, in a matter that identifies each stage in the distribution process. When a file is offered illegally it 25 enables the intellectual property holder, distributor and/ or reseller to exclude the identified recipient to receive files in the future or take other measures. This is an advantage over DRM systems according to the art, which only offer protection to a certain stage in the distribution process. In contrast to DRM the bought content can be legally played or viewed on any device, only when the content is illegally shared, the 30 identity of the last receiving instance can be identified.
In a preferred embodiment, the method comprises (D) iteratively repeating steps B and C for subsequent sending and receiving instances in the distribution channel. Therewith, when detecting an alleged illegally spread digital file, the instance that last 3 received it intentionally or legally can be determined, and the possible leaking source can be found.
Iteratively adding watermarks to a digital file may cause difficulties in retreiving the 5 watermark, or may even deteriorate the file in such way that the watermark creates visible or audible artifacts. To avoid these problems, in an embodiment, the method according to the invention comprises removing a prior watermark by the sending or streaming instance trough a plugin/ web application hosted by the patent holder.
10 In order to be able to recognise a watermarked file later on, as a first step, a digital file may be marked with a unique ID.
In yet another embodiment, subsequently added watermarks are laid over a not yet watermarked part of the digital file. This requires specific watermarking methods. In 15 case of an audio file, the file may be divided into parts corresponding with a certain playback time. This can for example be done by dividing the file length into an amount of intervals higher than the expected number of instances in the distribution channel. Each subsequent instance then places a watermark in the first free interval. A disadvantage of this method however is that the watermarks disappear when the file is 20 cut for some reason.
Another option, that provides a solution for this problem, is to divide the file length in intervals of one second or for example five seconds of playback time, and to divide these intervals into timeslots of several milliseconds, wherein a specific instance adds or 25 superimposes or stamps the watermark to a certain timeslot in each interval. It needs to be emphasised here that the actual file is divided in intervals according to the invention.
Evidently, an analogue technique could be applied to a document or book, wherein the intervals do not correspond with a predetermined amount of time, but rather with a 30 predetermined amount of mutations, for example synonyms and/or abbreviations to create a binary code. Examples that can be thought of are replacing “you’re” with “you are” or “is not” with “isn’t”, adding code to whitespaces, interchanging synonyms and/ or personalise the book.
4
In order to be able to find out at what level in the distribution channel the digital file was leaked, or illegally spread, the identifier may comprise an indication of a level/ stage in the distribution channel. For example, specific indicators for a “source”, a “producer”, a “webshop” or or “streaming platform” (such as Youtube or Soundcloud or 5 Spotify) and “end user” may be used. After analysing a leaked file, it can be determined at what level in the distribution channel further protection is necessary.
More specific detection can take place when the identifier is chosen to be a unique identifier. In this case, the exact instance that has last received the file can be 10 determined, and precautions can be taken against the instance coupled to the specific instance. For example, the identifier may comprise the IP address, a MAC or IMEA address or customer information such as user ID, login credentials or a creditcard number of the receiving instance. IP addresses are unique numbers, and they are registered with internet providers. For mobile media playing devices (telephones, 15 PDA’s, laptops and readers), device-specific codes may be used.
However, a central database of a system according to the present invention, does not necessarily need to store end-user information. It may store a unique code for every station in the distribution channel. During sales, and/or distribution and/or streaming, 20 codes are added or (re)placed. Herein, multiple codes may be combined as a single code, for example with a common checksum. This way, the system is only required to store the codes. If abuse is determined, the system may provide for example a webshop with the ID of its end user, so that the webshop may take action/ precautions. The codes may be chosen such that the entire distribution channel can be traced, or only a last end-25 user, that has leaked the file.
Watermarking the digital file is preferably performed real-time on the moment of streaming, (pre-)viewing, reading, playing or buying the file. An application can be provided that accepts a file for watermarking, and that adds a unique identifier. The 30 application can be stand alone, an applet, or a web application/ service. In another embodiment, according to the invention, a plugin/ API is provided to websites for incorporation thereon. Instances in the distribution chain can register and have a unique copy of such an application, or log on to a central web or server application which then authenticates the instance and adds a (unique) watermark.
5
The method according to the invention may further comprise the step of searching the internet for content infringing intellectual property rights. Various techniques to trace illegal content, i.e. content for which intellectual property rights are infringed, may be 5 applied. For example, peer-to-peer networks and file-sharing applications and websites can be searched. When illegal content is found, it is scanned for the presence of a watermark, and if a watermark is detected, the instance that has last legally received, and apparently has leaked the content is determined, and where applicable, contacted, or other actions/ precautions are taken such as (temporary) exclusion from a website or a 10 community.
According to en embodiment of the invention, no end users are contacted directly, but the last issuing party (i.e. a website, or webshop, or any streaming instance) is contacted. Such party may know the identity of the user, and may take further 15 precautions, such as a warning, a fee or an exclusion from a website or service, or even legal action. Preferably, the party is enabled to identify and contact the user. If the user makes use of the website, webshop or service anonymously, an IP address, or in case of the use of certain (mobile) media devices, a MAC or IMEA code may be registered.
20 Examples of parties for which the method and system according to the invention may be applicable are for example filehosting sites, such as Zippyshare, Megaupload, Rapidshare, streaming sites, such as Youtube.com, Soundcloud.com andVimeo.com, and peer to peer sharing sites and communities, such as torrents, Usenet and file sharing software such as Kazaa and Limewire. Content may further be spread via Social 25 networks such as Facebook, Hyves, etcetera.
Various coding techniques may be applied. Table 1 below gives a non extensive overview of possible digital data and types of watermarks that can be applied.
30 Table 1: 1 Music (Audio Watermark) 2 Text/ Books (Text Encoding + Personalization) 3 Video (Audio and Picture Watermark) 6 4 Pictures (Picture Watermark) 5 Software/ Games (Audio and Picture and Metadata Watermark)
Table two below gives an overview of the stations during the release process where a 5 watermark may be added, and parties that can be encoded in the watermark. According to the invention, watermarks may be added in one or more of these stages. However, it is preferred that a stage wherein the digital media is delivered to an end user is at least watermarked, so that the end user of a shop etcetera can be determined, and precautions can be taken.
10
Table 2: A Intellectual Property Holder (Artist/ Author/ Company) B Testing/Pre Viewing (Alpha/Beta Testers) 15 C (Post-) Production Company (Mastering Studio/Digital Publisher) D Promotion (Press) E Distribution (Partners) F Performance (Live Performance, (Online Viewing), Premiere) G Release General Public (Shop, Cinema, Internet Transmission/ Download) 20
The invention will now be elucidated into more detail, with reference to the following figures. Herein: - Figure 1 shows steps of a method for adding a watermark to a digital file according to the invention; 25 - Figure 2 shows a method for subsequently adding watermarks to a digital file during a distribution process thereof according to the invention;
Figure 3 shows a method for tracing a watermarked digital file according to the invention.
30 Figure 1 shows steps of a method 1 for adding a watermark to a digital file, using a so called application or a plugin for a website. The method comprises a first step of registering an instance at a central server application. After registering, as a second step, a pre-personalised application is supplied to the instance. The application may for example be downloadable, sent by e-mail or by other means of distribution. The 7 intellectual property comprises details of the instance, that may be used when watermarking a digital file. In another embodiment, a generic application may be made available, wherein the instance needs to fill out details for enabling the application to add specific watermarks to files.
5 A third step is to edit a file with the application, which may take place by dragging and dropping the file to the application. The application may require information on the destination of the file. Upon dropping the file, as a fourth step, the application may contact a central database, that authenticates the instance, and requires further 10 information. If the instance cannot be authenticated, as a fifth step, further information may be required, and a digital form may be presented. In that case, as a sixth step, registration may take place. When adding the watermark to the file, an amount is deducted from a credit of the instance, as seventh step. Next, as step eight, the watermarked file is output to a “processed files” folder. A ninth and last step is then to 15 send the file to a receiving instance. Besides an application, a plugin may be used as well.
Figure 2 shows a flowchart for watermarking digital files in a distribution channel according to the present invention. As a first step, a producer of an audio recording 20 retrieves the application as described with reference to figure 1. As a next step, a digital music file is provided with a watermark by an application used by the producer. The producer indicates the destination of the file, in this case, a record company. Then, the file is sent to a record company. The record company performs the same steps: it receives the file, provides it with a watermark by adding the latter with their own copy 25 of the application, and sends it to a next receiving instance, in the example given, a mastering studio. From this studio, the file is forwarded to internet shops, and then on to an end user, wherein at each level in the distribution channel corresponding steps are performed. For that purpose, the central server application may distinguish various different instance types, and issue specific watermarks, for example for producers, 30 masters, record companies, (web)shops, promo’s, portals, remixers, and websites like youtube and soundcloud (media streaming websites).
Figure 3 shows a method for tracing a watermarked digital file according to the invention. First, editors in the distribution channel register at the central server. Then, 8 content, in the form of a digital file, is sent to an end user or client. A next step is to collect content from various internet sources, such as websites, file sharing networks and blogs, and to filter new entries for registered titles to be monitored. When found, the content is downloaded, and checked for watermarks. If these watermarks are found, 5 details of the watermark are collected, and the last issuing instance or is contacted. A predetermined or suitable action or precaution is then taken, for example the user account is blocked or deleted, or in certain cases his/her creditcard may be charged.
Besides the above described methods, the present invention also relates to a system for 10 preventing violation of intellectual property rights of a digital file, comprising: means for adding a watermark to the digital file at a sending instance prior to sending the file, wherein the watermark comprises an identifier of the sending instance. The system may be configured for removing a previously added watermark, or to add a watermark in a part of a digital file where no watermark was available yet. The system may further 15 comprise local applications, each configured to run at an instance in the distribution channel of the digital file, wherein the local applications are further configured for communication with a central server application. The system may be implemented in various ways, such as an application, a plugin, a webservice, etcetera.
20
Claims (17)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NL2006658A NL2006658C2 (en) | 2011-04-22 | 2011-04-22 | Method and system for detecting violation of intellectual property rights of a digital file. |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NL2006658 | 2011-04-22 | ||
NL2006658A NL2006658C2 (en) | 2011-04-22 | 2011-04-22 | Method and system for detecting violation of intellectual property rights of a digital file. |
Publications (1)
Publication Number | Publication Date |
---|---|
NL2006658C2 true NL2006658C2 (en) | 2012-10-23 |
Family
ID=44640789
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
NL2006658A NL2006658C2 (en) | 2011-04-22 | 2011-04-22 | Method and system for detecting violation of intellectual property rights of a digital file. |
Country Status (1)
Country | Link |
---|---|
NL (1) | NL2006658C2 (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2358313A (en) * | 1999-12-20 | 2001-07-18 | Ibm | Unique watermarking of web documents |
WO2004006494A1 (en) * | 2002-07-09 | 2004-01-15 | Kaleidescape, Inc. | Parallel distribution and fingerprinting of digital content |
WO2004038531A2 (en) * | 2002-10-25 | 2004-05-06 | Matsushita Electric Industrial Co., Ltd. | Watermark insertion apparatus and watermark extraction apparatus |
WO2009027902A2 (en) * | 2007-08-27 | 2009-03-05 | Koninklijke Philips Electronics N.V. | Apparatus and methods for transferring editable digital content |
EP2071822A1 (en) * | 2007-12-13 | 2009-06-17 | Thomson Licensing | Method and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks |
-
2011
- 2011-04-22 NL NL2006658A patent/NL2006658C2/en active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2358313A (en) * | 1999-12-20 | 2001-07-18 | Ibm | Unique watermarking of web documents |
WO2004006494A1 (en) * | 2002-07-09 | 2004-01-15 | Kaleidescape, Inc. | Parallel distribution and fingerprinting of digital content |
WO2004038531A2 (en) * | 2002-10-25 | 2004-05-06 | Matsushita Electric Industrial Co., Ltd. | Watermark insertion apparatus and watermark extraction apparatus |
WO2009027902A2 (en) * | 2007-08-27 | 2009-03-05 | Koninklijke Philips Electronics N.V. | Apparatus and methods for transferring editable digital content |
EP2071822A1 (en) * | 2007-12-13 | 2009-06-17 | Thomson Licensing | Method and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9275199B2 (en) | Method and system for detecting violation of intellectual property rights of a digital file | |
US8055899B2 (en) | Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities | |
US8249992B2 (en) | Digital rights management and audience measurement systems and methods | |
US8126918B2 (en) | Using embedded data with file sharing | |
US20100174608A1 (en) | Digital rights management and audience measurement systems and methods | |
US8442997B2 (en) | Method and apparatus for monitoring the distribution of electronic files | |
US8655826B1 (en) | Processing and acting on rules for content recognition systems | |
US20080109369A1 (en) | Content Management System | |
US20100287201A1 (en) | Method and a system for identifying elementary content portions from an edited content | |
US20120030041A1 (en) | Content interactivity gateway and method of use therewith | |
US20170116694A1 (en) | System and method for monitoring a digital work | |
US11373009B2 (en) | Content playlist integrity | |
US20160050074A1 (en) | Content traceability using segmented watermark encoding | |
CN110619197B (en) | Digital asset right-confirming registration information processing system and method | |
CN112685794A (en) | Online evidence obtaining method, evidence obtaining and right maintaining method, system and computer equipment | |
NL2006658C2 (en) | Method and system for detecting violation of intellectual property rights of a digital file. | |
Jayasinghe et al. | VANGUARD: a blockchain-based solution to digital piracy | |
EP2134094A1 (en) | Method and system for performing transactions on multimedia streams being produced over a chain of contributing producers | |
WO2019198098A1 (en) | A system and method for tracking digital assets in a digital ecosystem | |
JP2009217661A (en) | Illicit content determination support system and control program for illicit content determination support system | |
CN115272040A (en) | Video copyright protection method based on block chain and digital watermark technology | |
KR101465754B1 (en) | The apparatus and method of establishing a copyright to a broadcasting content | |
JP2005057406A (en) | Method for providing distribution information of distribution data | |
Hirakawa et al. | A study on integrated mobile service using digital watermark for various information carriers | |
KR20100105983A (en) | Method for protecting copy right of video contents uploaded on internet by using hash code |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PD | Change of ownership |
Owner name: LINK-BUSTERS IP B.V.; NL Free format text: DETAILS ASSIGNMENT: VERANDERING VAN EIGENAAR(S), OVERDRACHT; FORMER OWNER NAME: MEDIA COWBOYZ B.V. Effective date: 20160204 |