USRE46918E1 - Program encoding and counterfeit tracking system and method - Google Patents

Program encoding and counterfeit tracking system and method Download PDF

Info

Publication number
USRE46918E1
USRE46918E1 US14/608,117 US201514608117A USRE46918E US RE46918 E1 USRE46918 E1 US RE46918E1 US 201514608117 A US201514608117 A US 201514608117A US RE46918 E USRE46918 E US RE46918E
Authority
US
United States
Prior art keywords
frames
audio
copy
visual program
locations
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US14/608,117
Inventor
Jeffrey H. Dewolde
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DELUXE LABORATORIES LLC
Original Assignee
DELUXE LABORATORIES LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/655,229 external-priority patent/USRE45406E1/en
Application filed by DELUXE LABORATORIES LLC filed Critical DELUXE LABORATORIES LLC
Priority to US14/608,117 priority Critical patent/USRE46918E1/en
Assigned to DELUXE LABORATORIES, INC. reassignment DELUXE LABORATORIES, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DEWOLDE, JEFFREY H.
Assigned to DELUXE LABORATORIES LLC reassignment DELUXE LABORATORIES LLC CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: DELUXE LABORATORIES, INC.
Application granted granted Critical
Publication of USRE46918E1 publication Critical patent/USRE46918E1/en
Assigned to PNC BANK, NATIONAL ASSOCIATION reassignment PNC BANK, NATIONAL ASSOCIATION SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DELUXE 3D LLC, DELUXE BROADCAST SERVICES LTD, DELUXE CREATIVE SERVICES INC., DELUXE ENTERTAINMENT SERVICES INC., DELUXE LABORATORIES LLC, DELUXE MEDIA INC., DELUXE ONE LLC, DELUXE UK HOLDINGS LIMITED
Assigned to DELUXE MEDIA INC., DELUXE LABORATORIES LLC, DELUXE ONE LLC, SOFTITLER NET, INC. reassignment DELUXE MEDIA INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: PNC BANK, NATIONAL ASSOCIATION
Assigned to PNC BANK, NATIONAL ASSOCIATION reassignment PNC BANK, NATIONAL ASSOCIATION INTELLECTUAL PROPERTY SECURITY AGREEMENT Assignors: DELUXE LABORATORIES LLC, DELUXE MEDIA INC., DELUXE ONE LLC, SOFTITLER NET, INC.
Assigned to LOAN ADMIN CO LLC reassignment LOAN ADMIN CO LLC GRANT OF SECURITY INTEREST IN UNTED STATES PATENTS Assignors: DELUXE MEDIA INC., DELUXE ONE LLC, SOFTITLER NET, INC.
Assigned to DELUXE MEDIA INC., DELUXE ONE LLC, SOFTITLER NET, INC. reassignment DELUXE MEDIA INC. RELEASE OF SECURITY INTEREST IN PATENTS Assignors: LOAN ADMIN CO LLC, AS COLLATERAL AGENT
Assigned to SOFTITLER NET, INC., DELUXE LABORATORIES LLC, DELUXE MEDIA INC., DELUXE ONE LLC reassignment SOFTITLER NET, INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: PNC BANK, NATIONAL ASSOCIATION
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0085Time domain based watermarking, e.g. watermarks spread over several images
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/442Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
    • H04N21/44236Monitoring of piracy processes or activities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8358Generation of protective data, e.g. certificates involving watermark
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0064Image watermarking for copy protection or copy management, e.g. CGMS, copy only once, one-time copy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0081Image watermarking whereby both original and watermarked images are required at decoder, e.g. destination-based, non-blind, non-oblivious

Definitions

  • This invention relates to the encoding of audio-visual programs such as motion pictures and the tracking of counterfeit program copies, particularly counterfeit copies made from releases of a motion picture in video form.
  • “Motion picture”, as that term is used herein, includes any type of program material using moving images as a medium of expression. It can include episodes of broadcast television programs, corporate events, as well as “movies”, etc.
  • both film and video copies When a new movie is released, it usually is released in both film and video versions.
  • a particularly crude but effective type of counterfeiting of film version of movies is the use of a video camera to copy a motion picture from a movie screen.
  • the copy made by this technique then is converted to video tape or DVD records, and the records are sold to the public and otherwise distributed, such as by way of the internet.
  • Video program counterfeiting usually is done by obtaining a legitimate copy of the program and copying it with the use of video capture cards or use of means known for the purpose.
  • the method described in that patent application uses coded arrays of artifacts to uniquely identify each copy distributed. Detection of the coded identification numbers from the counterfeit copies aids in tracking the source of the counterfeits. As successful as that method is, it is desired to improve on it, especially when detecting the sources of counterfeits of video distribution copies of a new motion picture.
  • noise has been embedded in the video signals in particular patterns to use in identifying the source. This has certain disadvantages, such as by requiring a substantial amount of extra hardware for use in recording the protected video copies.
  • the images appearing in specific pre-selected places in the video program are slightly altered so as to be essentially unnoticeable to the viewer.
  • the presence or absence of an altered picture at each of a number of pre-selected locations forms a code which represents a unique number applied to that copy of the motion picture.
  • the unique number then is recorded and stored, together with an identification of the person or entity who receives the copy when it is distributed, so as to enable law enforcement personnel to review suspected counterfeit copies of the motion picture to read the code number and identify the recipient of the copy and thereby track down the source of the counterfeit copies.
  • the alteration of the images consists of slightly shifting an image such as by changing the aspect ratio of the image. It is preferred to do this by enlarging an image slightly so that one or more edges of the image is moved relative to the same edge in the video master. Sometimes an image boundary overlaps a boundary of the frame and becomes invisible.
  • This alteration procedure helps enforcement personnel to compare the frame of a suspected counterfeit copy with an unaltered frame from an unaltered master copy of the motion picture to determine which of the images has been altered. When the pattern of alterations is detected, this will indicate the number of the copy which has been counterfeited and will lead to the possible source of the counterfeit.
  • the alteration of images is applied to each frame of a complete scene. This makes the alteration very difficult to detect without access to the unaltered master video.
  • each of the pre-determined locations for alterations consisted of a plurality of successive or separated scenes in order to ensure detectability of the alterations by enforcement personnel.
  • the code recorded by image alteration is combined with the separate code provided by the invention of the above-identified co-pending U.S. patent application so that enforcement personnel have two different codes to look for in identifying the source of a counterfeit and confirming the number of the copy which has been counterfeited.
  • a video copy with images altered at pre-determined locations is prepared. Then, the master video which has not been altered is played back in one playback device, such as a video server, while the altered version is played back on another playback device such as a second video server.
  • the output of both servers is delivered to a video router which controls a large number of different video recorders to simultaneously prepare copies in relatively large quantities.
  • a random number generator is employed to generate an identification number for each copy, and the number so generated is used to control one output channel of the router so as to alternatingly deliver the master video signal and the altered video signal and thereby record the altered images in a particular pattern which gives that copy a unique identification number.
  • the code made of artifacts is added by modifying the output signals of the second video server, in copies using both forms of coding.
  • FIG. 1 is a schematic view of several unaltered frames of video programs
  • FIG. 2 is a schematic view of the same frames as those shown in FIG. 1 , after alteration;
  • FIG. 3 is a schematic view of a system used to perform the encoding and prepare uniquely encoded video distribution copies of a motion picture or other program.
  • FIG. 4 is a schematic view of another encoding method used in tandem with the method illustrated in FIGS. 1 and 2 .
  • FIG. 1 shows a series 10 of three successive frames 12 , 14 and 16 from a single scene of a video program such as a motion picture.
  • Each frame contains an image of a square or block 26 . It is moving from left to right and thus is shown progressively closer to the right edge of the frame as one moves from frame 12 to frame 16 .
  • FIG. 2 shows the same three frames of the video program shown in FIG. 1 after alteration, in accordance with the present invention.
  • the alteration in this example, is an enlargement of the image by a relatively small amount, e.g., from less than 4% to 10%.
  • the enlargement of the object 26 to form the image 20 shown in the drawings is greater than that so as to more clearly illustrate the principle of the process.
  • the right edge 20 of the enlarged object 28 is closer to the right-hand border of the frame than the unaltered object 26 in the corresponding frame of FIG. 1 .
  • the right edge 30 extends beyond the right edge of the frame and thus is not visible.
  • the same alteration of the images is applied to all frames of each scene in which alteration is applied.
  • a variety of coding schemes can be used to encode a unique identification in each video distribution copy of a program.
  • the master can be run to each code location and still-framed when the code location is reached. When the corresponding portion of the copy is found and still-framed, frames in the master can be compared with corresponding frames of the copy.
  • a random number generator is used to generate a unique combination of signals forming a digital one or zero at each of the 64 locations. If the images are unaltered at a location, that is taken to be a digital zero. If the images are altered, that is taken to be a digital one.
  • the alterations preferably are repeated in each of a plurality of scenes at each of the 64 locations in order to avoid the loss of code due to cuts or deletions made in the copy by the counterfeiter, either deliberately or accidentally. Also, it facilitates detection of alterations by enforcement personnel because the alterations may be more visible in some scenes than others.
  • FIG. 3 is a schematic diagram of an encoding and video program duplication system 32 .
  • the system includes a first video server 34 , a second video server 36 , a video router 40 , a computer 42 with an input keyboard and screen 60 , with a storage unit 44 , and a plurality of video recorders 50 , 52 , 54 , 56 , etc., for making distribution video copies.
  • an image processor 48 which is used to alter the images output from the server 36 in accordance with instructions received from the computer 42 .
  • the unaltered master video is stored in the first or “master” server 34
  • the altered video is stored in the second or “modification” server 36 .
  • the altered video preferably has altered scenes at each of the 64 locations selected randomly by the computer 42 .
  • Signals from the unaltered master video are sent from the master server 34 to the router 40 while altered video signals are sent from the modification server 36 to the router 40 in synchronism with the master video signals.
  • the video router 40 has the ability to switch rapidly back and forth between two input video signals to produce on each of a large number of output terminals 58 a unique video signal which is made up of signals from each source alternating with signals from the other source.
  • the computer 42 contains a random number generator which is used to generate a unique 64-digit random number which is assigned to and stored for each of the output terminals of the router.
  • Each of the recorders 50 , 52 , etc. has a unique bar code identifying it.
  • Each blank DVD or tape on which the program is recorded also has a bar-code identifying it.
  • These bar codes are read by the use of bar code readers 62 , 64 , 66 and 68 , and associated with one another and stored in memory (e.g., a disk file) 44 .
  • the random number code also is stored and associated with the bar codes for the recorder and the record. Similarly, the identification for the recipient of each copy is stored and associated with the copy identification.
  • the time codes for the 64 locations are stored once for each program and made available to enforcement personnel in order to check a suspected counterfeit.
  • the alterations to the images can take forms other than enlargements.
  • the images can be enlarged in one dimension only instead of in both height and width, images can be slightly reduced in size in both or only one dimension, etc.
  • FIG. 4 shows a segment 70 of a motion picture video master in which one frame bears an image, represented by the line 78 , and a coded pattern 80 represents an alphanumeric character.
  • a coded pattern 80 represents an alphanumeric character.
  • One full frame 72 and parts of two adjacent frames 74 and 76 are shown in FIG. 4 .
  • the pattern is made of a plurality of very small dots 82 , 84 , 86 and 88 in a 3 ⁇ 3 dot matrix, although patterns and code elements other than those described can be used instead, as it will be explained in detail below.
  • the pattern represent one of the digits of an identification number which is assigned to each video copy. Preferably, this is a 5 digit number starting with 00001 and increasing by one for each additional copy made.
  • the numbers used will be 00001 to 00128.
  • the numbers assigned will be 00129 to 00257, etc.
  • the dot pattern shown may represent the first digit “0” of the number “01736” which has been given to the copy.
  • a different dot pattern is used to represent the “1”, the “7”, and each other digit in the number.
  • the modification server 36 begins by generating the pattern for the number “0” in the first “placeholder” location. This pattern will appear for two film frames, immediately following an edit.
  • the patterns can be generated at any edit point throughout the program with the exception of edits within modified scenes; that is, within scenes in which the images have been altered as described above.
  • Each of the specific locations is selected by the computer, and its time code is stored. Thus, if a pattern is found at a particular time code position in a suspected counterfeit program, it will not be necessary to be able to read the pattern; it will be known what the number is simply by its location. Of course, its place in the identification number (that is, whether it is the first, second, third, fourth or fifth digit) also is known, from the stored time codes.
  • the modification server 36 In the production of a batch of copies (e.g., 128 copies), the modification server 36 first generates the pattern for the number “0” in the first placeholder position. All recorders that have been assigned the number “0” in the first placeholder position will now be switched by the router to receive an input feed from the modification server 36 .
  • the modification server 36 will generate the number “1” for the first placeholder. Once again, any recorders requiring the number “1” in the first placeholder will now be switched to the output of the server 36 .
  • the numbers generated for each placeholder will not exceed what is required before moving on to the next placeholder. In the example “01736”, there is no need to generate anything higher than a “1” in the second placeholder.
  • This process is repeated anywhere from 5 to 10 times throughout the duration of the program, depending on the run time of the program.
  • the coded copy number is repeated 5 to 10 times during the program. This protects against destruction of the code patterns which frequently occurs due to data compression or deliberate destruction by the counterfeiter.
  • the artifacts forming each code are formed by altering specific pixels of the video picture signals being transmitted from the second server 36 ( FIG. 3 ). This can be done by simply reducing the luminance level to zero in a few pixels to form small dark dots, by controlling the video color level of the pixels on the video card's output board in the server 36 . Preferably, this is done by programming the server 36 .
  • Pixel luminance and chroma values may be brought to zero or any other level greater than zero. For example, it can be desirable to subtract a predetermined luminance value from the existing luminance value of the pixel. The amount to be subtracted is the minimum amount required to enable enforcement personnel to see the dots in a pirated copy. In this method, no more pixel level change is used than is necessary, and this makes the pixels less obvious. Similarly, colors can be used to create the necessary marks. For example, a combination of luminance and color can be used to create the color brown, which is less obvious than black.
  • the contrast between the artifact and the program material is made just high enough to make the artifacts visible to enforcement personnel who know where to look.
  • the dots 82 , 84 , 86 , 88 are visible to the naked eye. Therefore, the print copy number can be read without any special equipment. However, reading is greatly aided by use of a stored record of where the codes are recorded in the film. With the aid of a time code reader and a video display unit, enforcement personnel can fast-forward to the locations in the program wherein the coded frames are located, and still-frame the codes frames for reading.
  • the dots need not be circular. However, it is preferred that they look like specks of dirt. This prevents them from being too evident to ordinary movie patrons, and makes them harder to find by people who do not know where to look.
  • small marks other than dots can be used as code elements.
  • Small marks which look like small scratches, elongated spots or color artifacts can be used
  • enforcement personnel can use one method to check the accuracy of the other, or can select which one is easiest to read in a given counterfeit copy.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Television Signal Processing For Recording (AREA)

Abstract

Unique encoding of each of a substantial number of distribution video copies of a program such as a motion picture is produced by altering the images slightly at several pre-selected locations in the program in a uniquely coded pattern. Suspected counterfeits can be compared with an unaltered master video to determine the encoded number for the copy which was counterfeited to enable tracking the source of the counterfeit. Preferably, each frame of several whole scenes is altered at each location by shifting an image so as to make the alterations largely undetectable by counterfeiters but easily detected by comparison with an unaltered master video. Artifacts are inserted in patterns representing a unique number for the program. These supplement the encoding by alteration of images and gives added means to aid in tracing counterfeit copies.

Description

CROSS-REFERENCE TO RELATED APPLICATION
The present application is a continuation reissue of application Ser. No. 13/655,229, filed Oct. 18, 2012, which is an application for reissue of U.S. Pat. No. 7,818,257, now RE45,406, the aforementioned priority application being hereby incorporated by reference in its entirety for all purposes.
This invention relates to the encoding of audio-visual programs such as motion pictures and the tracking of counterfeit program copies, particularly counterfeit copies made from releases of a motion picture in video form.
“Motion picture”, as that term is used herein, includes any type of program material using moving images as a medium of expression. It can include episodes of broadcast television programs, corporate events, as well as “movies”, etc.
When a new movie is released, it usually is released in both film and video versions. The first copies, both film and video copies, usually are “screeners” sent to studio executives, advertising agencies, Motion Picture Academy Members and others. Later, film copies are sent to theaters and video copies are sent to airlines and hotels, then to pay-per-view distributors, and, finally, to free television broadcasters.
The production and sale of counterfeit copies of motion pictures is a serious problem of long standing. Counterfeit copies of new motion pictures sometimes are sold to the public even before the motion picture has been released by the motion picture studio. These counterfeit copies are hard to trace, and it is a difficult job to identify and bring the counterfeiters to justice.
A particularly crude but effective type of counterfeiting of film version of movies is the use of a video camera to copy a motion picture from a movie screen. The copy made by this technique then is converted to video tape or DVD records, and the records are sold to the public and otherwise distributed, such as by way of the internet.
Video program counterfeiting usually is done by obtaining a legitimate copy of the program and copying it with the use of video capture cards or use of means known for the purpose.
Attempts have been made in the past to stem the tide of such counterfeits. An effective system and method for tracing the sources of counterfeits of motion pictures is described in U.S. patent application Ser. No. 10/657,287 filed on Sep. 9, 2003, which is assigned to Deluxe Laboratories, Inc., the assignee of this patent application. The disclosure of that patent application is hereby incorporated herein by reference.
The method described in that patent application uses coded arrays of artifacts to uniquely identify each copy distributed. Detection of the coded identification numbers from the counterfeit copies aids in tracking the source of the counterfeits. As successful as that method is, it is desired to improve on it, especially when detecting the sources of counterfeits of video distribution copies of a new motion picture.
In certain prior proposals for video copy protection, noise has been embedded in the video signals in particular patterns to use in identifying the source. This has certain disadvantages, such as by requiring a substantial amount of extra hardware for use in recording the protected video copies.
Other so-called “electronic water-marking” schemes have been proposed and are not believed to have been successfully employed in solving the problems intended to be solved by the present invention.
In accordance with the present invention, the images appearing in specific pre-selected places in the video program are slightly altered so as to be essentially unnoticeable to the viewer. The presence or absence of an altered picture at each of a number of pre-selected locations forms a code which represents a unique number applied to that copy of the motion picture. The unique number then is recorded and stored, together with an identification of the person or entity who receives the copy when it is distributed, so as to enable law enforcement personnel to review suspected counterfeit copies of the motion picture to read the code number and identify the recipient of the copy and thereby track down the source of the counterfeit copies.
Preferably, the alteration of the images consists of slightly shifting an image such as by changing the aspect ratio of the image. It is preferred to do this by enlarging an image slightly so that one or more edges of the image is moved relative to the same edge in the video master. Sometimes an image boundary overlaps a boundary of the frame and becomes invisible.
This alteration procedure helps enforcement personnel to compare the frame of a suspected counterfeit copy with an unaltered frame from an unaltered master copy of the motion picture to determine which of the images has been altered. When the pattern of alterations is detected, this will indicate the number of the copy which has been counterfeited and will lead to the possible source of the counterfeit.
In a preferred embodiment, the alteration of images is applied to each frame of a complete scene. This makes the alteration very difficult to detect without access to the unaltered master video.
It also is preferable that each of the pre-determined locations for alterations consisted of a plurality of successive or separated scenes in order to ensure detectability of the alterations by enforcement personnel.
In accordance with another aspect of the invention, the code recorded by image alteration is combined with the separate code provided by the invention of the above-identified co-pending U.S. patent application so that enforcement personnel have two different codes to look for in identifying the source of a counterfeit and confirming the number of the copy which has been counterfeited.
In making video copies containing the codes described above, a particularly advantageous method is used.
First, a video copy with images altered at pre-determined locations is prepared. Then, the master video which has not been altered is played back in one playback device, such as a video server, while the altered version is played back on another playback device such as a second video server. The output of both servers is delivered to a video router which controls a large number of different video recorders to simultaneously prepare copies in relatively large quantities.
A random number generator is employed to generate an identification number for each copy, and the number so generated is used to control one output channel of the router so as to alternatingly deliver the master video signal and the altered video signal and thereby record the altered images in a particular pattern which gives that copy a unique identification number.
The code made of artifacts is added by modifying the output signals of the second video server, in copies using both forms of coding.
The foregoing and other objects and advantages of the invention will be apparent from or explained in the following description and drawings.
IN THE DRAWINGS
FIG. 1 is a schematic view of several unaltered frames of video programs;
FIG. 2 is a schematic view of the same frames as those shown in FIG. 1, after alteration;
FIG. 3 is a schematic view of a system used to perform the encoding and prepare uniquely encoded video distribution copies of a motion picture or other program; and
FIG. 4 is a schematic view of another encoding method used in tandem with the method illustrated in FIGS. 1 and 2.
GENERAL DESCRIPTION
FIG. 1 shows a series 10 of three successive frames 12, 14 and 16 from a single scene of a video program such as a motion picture.
Each frame contains an image of a square or block 26. It is moving from left to right and thus is shown progressively closer to the right edge of the frame as one moves from frame 12 to frame 16.
FIG. 2 shows the same three frames of the video program shown in FIG. 1 after alteration, in accordance with the present invention. The alteration, in this example, is an enlargement of the image by a relatively small amount, e.g., from less than 4% to 10%. The enlargement of the object 26 to form the image 20 shown in the drawings is greater than that so as to more clearly illustrate the principle of the process.
In each of the altered frames 20, 22 and 24 the right edge 20 of the enlarged object 28 is closer to the right-hand border of the frame than the unaltered object 26 in the corresponding frame of FIG. 1. In fact, in the right-most frame 24, the right edge 30 extends beyond the right edge of the frame and thus is not visible.
In accordance with a highly advantageous feature of the preferred embodiment of the invention, the same alteration of the images is applied to all frames of each scene in which alteration is applied.
The fact that a frame of the video program has been altered can be determined by viewing the altered frame in comparison with the same frame in the unaltered master video copy, such as by juxtaposing the two frames near one another, in the manner illustrated by FIGS. 1 and 2. However, it is believed to be very difficult for a counterfeiter to detect the alterations without having the unaltered master to compare the copy with.
This superior result is due, in part, to the fact that the same alteration is applied to every frame within the scene in which it is applied. Were this not done, a counterfeiter might be able to detect the alteration as a sudden change within a scene and take steps to correct his counterfeit copy to eliminate it. Instead, the sudden change from one scene to the next masks the sudden change caused by the alteration.
Since it is relatively easy to keep the unaltered master out of the hands of counterfeiters, the encoding of the invention is very difficult for counterfeiters to detect and defeat.
Coding Scheme
A variety of coding schemes can be used to encode a unique identification in each video distribution copy of a program.
In the preferred coding scheme, 64 different locations in the program are pre-selected. The locations can be selected at random. The time code of each location is stored. Thus, during review of a suspected counterfeit, the master can be run to each code location and still-framed when the code location is reached. When the corresponding portion of the copy is found and still-framed, frames in the master can be compared with corresponding frames of the copy.
A random number generator is used to generate a unique combination of signals forming a digital one or zero at each of the 64 locations. If the images are unaltered at a location, that is taken to be a digital zero. If the images are altered, that is taken to be a digital one.
The number of genuine copies made of many programs, such as movies, usually is relatively low, e.g., in the hundreds or low thousands. A 64-unit code is not necessary in order to uniquely identify each such copy. However, by providing so many digits, distinct advantages are obtained.
First, there is no need to access the code at its start because virtually any sequence of 10 to 15 digits can be compared with the codes stored for the copies until a unique match is found. A match can be found quickly and easily using conventional computer software.
Secondly, a longer code sequence is harder to completely delete when making an illegal copy. Thus, it is more likely that enough code will survive the counterfeiter's effort to destroy it.
The alterations preferably are repeated in each of a plurality of scenes at each of the 64 locations in order to avoid the loss of code due to cuts or deletions made in the copy by the counterfeiter, either deliberately or accidentally. Also, it facilitates detection of alterations by enforcement personnel because the alterations may be more visible in some scenes than others.
In addition, if a scene is repeated at a location very near its first appearance, both of the appearances will be altered and comparison of the two will yield nothing for the counterfeiter.
Encoding and Duplication System
FIG. 3 is a schematic diagram of an encoding and video program duplication system 32.
The system includes a first video server 34, a second video server 36, a video router 40, a computer 42 with an input keyboard and screen 60, with a storage unit 44, and a plurality of video recorders 50, 52, 54, 56, etc., for making distribution video copies.
Although it does not take part in the production of copies, also shown in FIG. 3 are an image processor 48 which is used to alter the images output from the server 36 in accordance with instructions received from the computer 42.
The unaltered master video is stored in the first or “master” server 34, and the altered video is stored in the second or “modification” server 36. The altered video preferably has altered scenes at each of the 64 locations selected randomly by the computer 42.
Signals from the unaltered master video are sent from the master server 34 to the router 40 while altered video signals are sent from the modification server 36 to the router 40 in synchronism with the master video signals.
The video router 40, as it is well known, has the ability to switch rapidly back and forth between two input video signals to produce on each of a large number of output terminals 58 a unique video signal which is made up of signals from each source alternating with signals from the other source.
The computer 42 contains a random number generator which is used to generate a unique 64-digit random number which is assigned to and stored for each of the output terminals of the router.
Each of the recorders 50, 52, etc., has a unique bar code identifying it. Each blank DVD or tape on which the program is recorded also has a bar-code identifying it. These bar codes are read by the use of bar code readers 62, 64, 66 and 68, and associated with one another and stored in memory (e.g., a disk file) 44.
The random number code also is stored and associated with the bar codes for the recorder and the record. Similarly, the identification for the recipient of each copy is stored and associated with the copy identification.
The time codes for the 64 locations are stored once for each program and made available to enforcement personnel in order to check a suspected counterfeit.
It should be understood that the alterations to the images can take forms other than enlargements. For example, the images can be enlarged in one dimension only instead of in both height and width, images can be slightly reduced in size in both or only one dimension, etc.
Second Coding Method
Although the foregoing method can be used alone, it is preferred to use a second coding method in addition.
FIG. 4 shows a segment 70 of a motion picture video master in which one frame bears an image, represented by the line 78, and a coded pattern 80 represents an alphanumeric character. One full frame 72 and parts of two adjacent frames 74 and 76 are shown in FIG. 4.
Preferably, the pattern is made of a plurality of very small dots 82, 84, 86 and 88 in a 3×3 dot matrix, although patterns and code elements other than those described can be used instead, as it will be explained in detail below.
Although any desired information can be encoded, in this invention, it is preferred that the pattern represent one of the digits of an identification number which is assigned to each video copy. Preferably, this is a 5 digit number starting with 00001 and increasing by one for each additional copy made. Thus, if 128 recorders are connected to the router 40 during a production run, the numbers used will be 00001 to 00128. In the second production run, the numbers assigned will be 00129 to 00257, etc.
For example, the dot pattern shown may represent the first digit “0” of the number “01736” which has been given to the copy. Similarly, a different dot pattern is used to represent the “1”, the “7”, and each other digit in the number.
During a record production run, the modification server 36 begins by generating the pattern for the number “0” in the first “placeholder” location. This pattern will appear for two film frames, immediately following an edit.
Locating a pattern immediately following an edit makes the dots harder to see. The patterns can be generated at any edit point throughout the program with the exception of edits within modified scenes; that is, within scenes in which the images have been altered as described above.
There are ten specific locations for each of the numbers 0-9 at the first placeholder location, ten more specific locations at the second placeholder location for the second number, ten more at the third placeholder location, and ten more at each of the fourth and fifth place holder locations.
Each of the specific locations is selected by the computer, and its time code is stored. Thus, if a pattern is found at a particular time code position in a suspected counterfeit program, it will not be necessary to be able to read the pattern; it will be known what the number is simply by its location. Of course, its place in the identification number (that is, whether it is the first, second, third, fourth or fifth digit) also is known, from the stored time codes.
In the production of a batch of copies (e.g., 128 copies), the modification server 36 first generates the pattern for the number “0” in the first placeholder position. All recorders that have been assigned the number “0” in the first placeholder position will now be switched by the router to receive an input feed from the modification server 36.
Next, the modification server 36 will generate the number “1” for the first placeholder. Once again, any recorders requiring the number “1” in the first placeholder will now be switched to the output of the server 36.
In this fashion, the system steps through all of the numbers in all of the placeholders; 0 to 9 in placeholder number 1; 0 to 9 in placeholder number 2, etc., until the patterns forming all the numbers to represent a different five-digit number for each copy have been recorded.
The numbers generated for each placeholder will not exceed what is required before moving on to the next placeholder. In the example “01736”, there is no need to generate anything higher than a “1” in the second placeholder.
This process is repeated anywhere from 5 to 10 times throughout the duration of the program, depending on the run time of the program. Thus, the coded copy number is repeated 5 to 10 times during the program. This protects against destruction of the code patterns which frequently occurs due to data compression or deliberate destruction by the counterfeiter.
Preferably, the artifacts forming each code are formed by altering specific pixels of the video picture signals being transmitted from the second server 36 (FIG. 3). This can be done by simply reducing the luminance level to zero in a few pixels to form small dark dots, by controlling the video color level of the pixels on the video card's output board in the server 36. Preferably, this is done by programming the server 36.
Pixel luminance and chroma values may be brought to zero or any other level greater than zero. For example, it can be desirable to subtract a predetermined luminance value from the existing luminance value of the pixel. The amount to be subtracted is the minimum amount required to enable enforcement personnel to see the dots in a pirated copy. In this method, no more pixel level change is used than is necessary, and this makes the pixels less obvious. Similarly, colors can be used to create the necessary marks. For example, a combination of luminance and color can be used to create the color brown, which is less obvious than black.
In other words, the contrast between the artifact and the program material is made just high enough to make the artifacts visible to enforcement personnel who know where to look.
The dots 82, 84, 86, 88 are visible to the naked eye. Therefore, the print copy number can be read without any special equipment. However, reading is greatly aided by use of a stored record of where the codes are recorded in the film. With the aid of a time code reader and a video display unit, enforcement personnel can fast-forward to the locations in the program wherein the coded frames are located, and still-frame the codes frames for reading.
In this way, the other digits of the program code number can be read, and the records kept showing the entity or person to which each copy was sent will then help to quickly narrow the search for the counterfeiter.
The dots need not be circular. However, it is preferred that they look like specks of dirt. This prevents them from being too evident to ordinary movie patrons, and makes them harder to find by people who do not know where to look.
As it is explained in greater detail in the above-identified co-pending patent application, small marks other than dots can be used as code elements. Small marks which look like small scratches, elongated spots or color artifacts can be used
When both encoding methods are used, enforcement personnel can use one method to check the accuracy of the other, or can select which one is easiest to read in a given counterfeit copy.
The above description of the invention is intended to be illustrative and not limiting. Various changes or modifications in the embodiments described may occur to those skilled in the art. These can be made without departing from the spirit or scope of the invention.

Claims (25)

What is claimed is:
1. A method for uniquely identifying a copy of an audio-visual program recorded in an electronic recording medium or optically recorded form, said method comprising:
selecting a master version of an audio-visual program to be copied;
making at least one copy of the master version of an audio-visual program such that each copy includes its own unique identification; and
embedding the unique identification into each copy of the audio-visual program when making each copy of the audio-visual program by performing the following steps:
(a) altering visible images appearing at selected ones of a plurality of different locations in said master version of an audio-visual program by enlarging an image in at least one frame in each of said selected locations; and
(b) selecting said ones of said locations in each copy to create a unique pattern of enlarged images in each copy to uniquely identify each copy.
2. A method as in claim 1 including the step of storing at a location separate from said copy information representing said pattern for each copy.
3. A method as in claim 1 in which all of the images in a scene are altered at each of said locations.
4. A method as in claim 1 in which said enlarging step comprises enlarging said image in at least one dimension by from approximately four to ten percent.
5. A method as in claim 1 including distributing a plurality of said copies to a plurality of recipients with each of said copies having a unique pattern, recording the identity of each of said recipients, and storing the patterns of each copy distributed to each of said recipients.
6. A method as in claim 1 including the step of introducing artifacts forming an encoded symbol in each copy at further selected ones of a plurality of other locations.
7. A method as in claim 6 including storing the locations of said artifacts for each copy and storing the identification of the recipients of each copy.
8. A method as in claim 6 in which said artifacts are introduced at locations immediately following an edit.
9. A method as in claim 6 in which a plurality of specific locations is provided at each of a plurality of larger locations, there being one specific location in a larger location for each of ten numbers which forms one digit of an identification number for the copy being made, whereby the place and the digit can be determined by the specific location of the artifacts.
10. A method as in claim 1 in which the presence of an altered image in a selected frame indicates one of a digital 1 and a digital 0, and the absence of an altered image in said frame indicates the other of said digital 1 and 0, and the combination of digital 1's and 0's in a given sequence of selected frames forms a number unique to the program copy in which it appears.
11. A method as in claim 1 in which said alteration is repeated in a plurality of different scenes at each of said locations.
12. The method of claim 1, wherein the image is enlarged by altering an aspect ratio of the image.
13. The method of claim 1, further comprising making a plurality of copies of the master version of an audio-visual program such that each of the a plurality of copies includes its own respective unique pattern of enlarged images to uniquely identify each copy.
14. A method for uniquely identifying a copy of an audio-visual program having a sequence of frames of images, the method comprising
selecting a master version of the audio-visual program to be copied; and
making at least one copy of the master version of the audio-visual program such that each respective copy includes its own unique identification, wherein
the making of the respective copy of the master version of the audio-visual program comprises embedding the unique identification into the respective copy of the audio-visual program by
obtaining in a computing device a unique identifier corresponding to the unique identification of the respective copy;
selecting by the computing device a plurality of different locations in the sequence of frames to form a set of predetermined locations;
enlarging by the computing device an image contained within one or more frames at each of the plurality of different locations in the sequence of frames; and
creating by the computing device a unique pattern of enlarged images within the frames in the sequence of frames in the respective copy, the unique pattern corresponding to the unique identifier;
wherein the enlarging and the creating further comprise
receiving, in a router, the master version of the audio-visual program;
receiving, in the router, an altered version of the audio-visual program, wherein the altered version of the audio-visual program has enlarged images within the frames at each location in the set of predetermined locations; and
switching, by the router, between the master version of the audio-visual program and the altered version of the audio-visual program at selected locations within the set of predetermined locations in accordance with the unique identifier to generate the respective copy of the master version of the audio-visual program having the unique pattern of enlarged images within the frames.
15. The method of claim 14, further comprising identifying a set of different scenes in the audio-visual program; and selecting the set of predetermined locations based on the set of different scenes.
16. A non-transitory computer storage medium storing instructions which when executed by a computing device, cause the computing device to perform a method for uniquely identifying a copy of an audio-visual program having a sequence of frames of images, the method comprising
receiving, in a computing device, a master version of the audio-visual program to be copied;
generating, by the computing device, an altered version of the audio-visual program by
determining a set of predetermined locations in the sequence of frames;
enlarging an image within one or more frames at each location within the set of predetermined locations in the sequence of frames; and
replacing frames of the master version at the set of predetermined locations with altered frames containing the enlarged images; and
making a plurality of copies of the master version of the audio-visual program, such that each respective copy includes a respective unique identification, by embedding the respective unique identification into each respective copy of the audio-visual program, wherein the embedding further comprises
obtaining, in the computing device, a unique identifier corresponding to the unique identification of the respective copy;
switching, by the computing device, at a subset of the set of predetermined locations, between the master version of the audio-visual program and the altered version of the audio-visual program, in accordance with the unique identifier; and
creating, through the switching, a unique pattern of the altered frames within the set of predetermined locations within the sequence of frames in the respective copy of the master version of the audio-visual program, wherein the unique pattern corresponds to the unique identifier.
17. The non-transitory computer storage medium of claim 16, wherein
each unique identifier includes a plurality of bits corresponding to the set of predetermined locations in the sequence of frames; and
for each respective bit of the unique identifier, the switching between the master version and the altered version further comprises
in response to a determination that the respective bit is in a first predetermined state, outputting frames from the master version of the audio-visual program as frames of the respective copy; and
in response to a determination that the respective bit is in a second predetermined state, outputting frames from the altered version of the audio-visual program as frames of the respective copy.
18. A computing device, comprising
at least one server; and
a non-transitory computer storage medium storing instructions which when executed by the at least one server, causes the at least one server to
receive a master version of an audio-visual program having a sequence of frames of images;
generate an altered version of the audio-visual program through replacing, at a set of predetermined locations within the sequence of frames, respective frames of the master version with altered frames of the respective frames of the master version having enlarged images within the altered frames; and
make a plurality of copies of the master version of the audio-visual program, such that each respective copy includes a respective unique identification, by embedding the respective unique identification into each respective copy, wherein the embedding further comprises
obtaining a unique identifier corresponding to the unique identification of the respective copy;
switching, at a subset of the set of predetermined locations, between outputting the master version of the audio-visual program and outputting the altered version of the audio-visual program in accordance with the unique identifier; and
generating, via the switching, a unique pattern of the altered frames within the set of predetermined locations within the sequence of frames in the respective copy, wherein the unique pattern corresponds to the unique identifier.
19. The computing device of claim 18, wherein each unique identifier includes a plurality of bits corresponding to the set of predetermined locations in the sequence of frames; and
wherein, for each respective bit of the unique identifier, the switching between the master version and the altered version comprises
in response to a determination that the respective bit is in a first predetermined state, outputting frames from the master version of the audio-visual program as frames of the respective copy; and
in response to a determination that the respective bit is in a second predetermined state, outputting frames from the altered version of the audio-visual program as frames of the respective copy.
20. A method for uniquely identifying a copy of an audio-visual program having a sequence of frames of images, the method comprising
selecting a master version of the audio-visual program to be copied; and
making at least one copy of the master version of the audio-visual program such that each respective copy includes its own unique identification, wherein
the making of the respective copy of the master version of the audio-visual program comprises embedding the unique identification into the respective copy of the audio-visual program by
obtaining in a computing device a unique identifier corresponding to the unique identification of the respective copy;
selecting by the computing device a plurality of different locations in the sequence of frames to form a set of predetermined locations;
enlarging by the computing device an image within one or more frames at each of the plurality of different locations in the sequence of frames; and
creating by the computing device a unique pattern of enlarged images within the frames in the sequence of frames in the respective copy, the unique pattern corresponding to the unique identifier; wherein
the unique identifier includes a plurality of bits corresponding to the set of predetermined locations in the sequence of frames;
a first subset of locations in the set of predetermined locations having enlarged images within the frames corresponds to bits of the unique identifier having a first state; and
a second subset of locations in the set of predetermined locations having no enlarged images within the frames corresponds to bits of the unique identifier having a second state.
21. The method of claim 20, wherein the enlarging and the creating comprise:
receiving, in a router, the master version of the audio-visual program;
receiving, in the router, an altered version of the audio-visual program, wherein the altered version of the audio-visual program has enlarged images within the frames at each location in the set of predetermined locations; and
switching, by the router, between the master version of the audio-visual program and the altered version of the audio-visual program at selected locations within the set of predetermined locations in accordance with the unique identifier to generate the respective copy of the master version of the audio-visual program having the unique pattern of enlarged images within the frames.
22. The method of claim 20, further comprising identifying a set of different scenes in the audio-visual program; and selecting the set of predetermined locations based on the set of different scenes.
23. The method of claim 20, further comprising storing by the computing device at a location separate from the respective copy an identity of a recipient of the respective copy and information representing the unique pattern.
24. The method of claim 20, wherein the enlarging of the image within the frames at each of the plurality of different locations in the sequence of frames according to the unique identifier includes enlarging images within all of the frames at each of the plurality of locations in the sequence of frames.
25. The method of claim 20, wherein the enlarged images within the frames at each of the plurality of locations in the sequence of frames are enlarged in at least one dimension by four to ten percent.
US14/608,117 2004-07-16 2015-01-28 Program encoding and counterfeit tracking system and method Active 2026-12-06 USRE46918E1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/608,117 USRE46918E1 (en) 2004-07-16 2015-01-28 Program encoding and counterfeit tracking system and method

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US10/893,508 US7818257B2 (en) 2004-07-16 2004-07-16 Program encoding and counterfeit tracking system and method
US13/655,229 USRE45406E1 (en) 2003-09-08 2012-10-18 Program encoding and counterfeit tracking system and method
US14/608,117 USRE46918E1 (en) 2004-07-16 2015-01-28 Program encoding and counterfeit tracking system and method

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/893,508 Reissue US7818257B2 (en) 2003-09-08 2004-07-16 Program encoding and counterfeit tracking system and method

Publications (1)

Publication Number Publication Date
USRE46918E1 true USRE46918E1 (en) 2018-06-26

Family

ID=35600658

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/893,508 Ceased US7818257B2 (en) 2003-09-08 2004-07-16 Program encoding and counterfeit tracking system and method
US14/608,117 Active 2026-12-06 USRE46918E1 (en) 2004-07-16 2015-01-28 Program encoding and counterfeit tracking system and method

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/893,508 Ceased US7818257B2 (en) 2003-09-08 2004-07-16 Program encoding and counterfeit tracking system and method

Country Status (1)

Country Link
US (2) US7818257B2 (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040125125A1 (en) * 2002-06-29 2004-07-01 Levy Kenneth L. Embedded data windows in audio sequences and video frames
US7694318B2 (en) 2003-03-07 2010-04-06 Technology, Patents & Licensing, Inc. Video detection and insertion
US7809154B2 (en) 2003-03-07 2010-10-05 Technology, Patents & Licensing, Inc. Video entity recognition in compressed digital video streams
US7738704B2 (en) 2003-03-07 2010-06-15 Technology, Patents And Licensing, Inc. Detecting known video entities utilizing fingerprints
US7690011B2 (en) * 2005-05-02 2010-03-30 Technology, Patents & Licensing, Inc. Video stream modification to defeat detection
US7394519B1 (en) * 2007-02-08 2008-07-01 Deluxe Laboratories, Inc. System and method for audio encoding and counterfeit tracking a motion picture
US8625027B2 (en) * 2011-12-27 2014-01-07 Home Box Office, Inc. System and method for verification of media content synchronization
US9948626B2 (en) * 2013-03-15 2018-04-17 Aerohive Networks, Inc. Split authentication network systems and methods
ES2682198T3 (en) 2013-11-04 2018-09-19 Nagravision S.A. Device and method for marking digital audio or audio and / or video content
WO2016085018A1 (en) * 2014-11-27 2016-06-02 엘지전자 주식회사 Display device
CN112101155B (en) * 2020-09-02 2024-04-26 北京博睿维讯科技有限公司 Display content verification method, device, system and storage medium

Citations (56)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1235765A (en) 1967-10-25 1971-06-16 Micro Mega Sa Holder for tools, particularly dental tools
US5080479A (en) * 1990-07-30 1992-01-14 Rosenberg Stanley L Automatic implanting of identification data in any recorded medium
US5251041A (en) * 1991-06-21 1993-10-05 Young Philip L Method and apparatus for modifying a video signal to inhibit unauthorized videotape recording and subsequent reproduction thereof
US5303294A (en) * 1991-06-18 1994-04-12 Matsushita Electric Industrial Co., Ltd. Video theater system and copy preventive method
US5315448A (en) * 1993-03-18 1994-05-24 Macrovision Corporation Copy protection for hybrid digital video tape recording and unprotected source material
US5636292A (en) * 1995-05-08 1997-06-03 Digimarc Corporation Steganography methods employing embedded calibration data
US5680454A (en) * 1995-08-04 1997-10-21 Hughes Electronics Method and system for anti-piracy using frame rate dithering
US5699427A (en) * 1995-06-23 1997-12-16 International Business Machines Corporation Method to deter document and intellectual property piracy through individualization
US5710834A (en) * 1995-05-08 1998-01-20 Digimarc Corporation Method and apparatus responsive to a code signal conveyed through a graphic image
US5743615A (en) * 1996-12-31 1998-04-28 Eastman Kodak Company Film slides having encoded data and methods for preparing film slides
US5751368A (en) * 1994-10-11 1998-05-12 Pixel Instruments Corp. Delay detector apparatus and method for multiple video sources
US5809160A (en) * 1992-07-31 1998-09-15 Digimarc Corporation Method for encoding auxiliary data within a source signal
GB2325765A (en) 1997-04-07 1998-12-02 Ibm Data hiding and detection
US5850481A (en) * 1993-11-18 1998-12-15 Digimarc Corporation Steganographic system
US5859920A (en) * 1995-11-30 1999-01-12 Eastman Kodak Company Method for embedding digital information in an image
EP0899688A2 (en) 1997-08-29 1999-03-03 Fujitsu Limited Device for generating, detecting, recording, and reproducing a watermarked moving image
US5959717A (en) * 1997-12-12 1999-09-28 Chaum; Jerry Motion picture copy prevention, monitoring, and interactivity system
US6005643A (en) * 1996-10-15 1999-12-21 International Business Machines Corporation Data hiding and extraction methods
US6018374A (en) * 1996-06-25 2000-01-25 Macrovision Corporation Method and system for preventing the off screen copying of a video or film presentation
US6044156A (en) * 1997-04-28 2000-03-28 Eastman Kodak Company Method for generating an improved carrier for use in an image data embedding application
US6122392A (en) * 1993-11-18 2000-09-19 Digimarc Corporation Signal processing to hide plural-bit information in image, video, and audio data
US6285774B1 (en) * 1998-06-08 2001-09-04 Digital Video Express, L.P. System and methodology for tracing to a source of unauthorized copying of prerecorded proprietary material, such as movies
US6325420B1 (en) * 1998-08-17 2001-12-04 Inspectron Corporation Method for embedding non-intrusive encoded data in printed matter and system for reading same
US6396594B1 (en) * 1999-03-31 2002-05-28 International Business Machines Corporation Method for providing flexible and secure administrator-controlled watermarks
EP1217840A2 (en) 2000-12-13 2002-06-26 Eastman Kodak Company System and method for embedding a watermark in digital image sequences
US20020097870A1 (en) 2001-01-23 2002-07-25 Nelson Terence J. Method and system for tracing an analog copy of a digital work to a unique digital copy and a particular digital player
US20020168069A1 (en) * 2001-02-28 2002-11-14 Babak Tehranchi Copy protection for digital motion picture image data
US6529600B1 (en) * 1998-06-25 2003-03-04 Koninklijke Philips Electronics N.V. Method and device for preventing piracy of video material from theater screens
US6542618B1 (en) * 1993-11-18 2003-04-01 Digimarc Corporation Methods for watermark decoding
US6556273B1 (en) 1999-11-12 2003-04-29 Eastman Kodak Company System for providing pre-processing machine readable encoded information markings in a motion picture film
US6558273B2 (en) * 1999-06-08 2003-05-06 K. K. Endo Seisakusho Method for manufacturing a golf club
US20030091189A1 (en) * 1993-11-18 2003-05-15 Rhoads Geoffrey B. Arrangement for embedding subliminal data in imaging
US20030174769A1 (en) * 2001-05-10 2003-09-18 Takefumi Nagumo Motion picture encoding apparatus
US6624874B2 (en) * 2001-12-21 2003-09-23 Eastman Kodak Company Apparatus and method for inserting an updateable hidden image into an optical path
US20030187674A1 (en) * 2002-04-02 2003-10-02 Odgers Chris R. Methods and apparatus for uniquely identifying a large number of film prints
US20030187679A1 (en) * 2002-04-02 2003-10-02 Odgers Chris R. Methods and apparatus for uniquely identifying a large number of film prints
US20030202679A1 (en) 2002-04-29 2003-10-30 The Boeing Company Watermarks for secure distribution of digital data
US6681029B1 (en) * 1993-11-18 2004-01-20 Digimarc Corporation Decoding steganographic messages embedded in media signals
US20040033060A1 (en) * 2002-08-14 2004-02-19 Qdesign Corporation Modulation of a video signal with an impairment signal to increase the video signal masked threshold
US20040033051A1 (en) * 2002-08-16 2004-02-19 Ip Kiril Kun Wan Method and system for producing and displaying visual presentations which inhibit off-screen duplication
WO2004030339A2 (en) 2002-09-27 2004-04-08 Technicolor, Inc. Motion picture anti-piracy coding
US6735776B1 (en) * 1999-02-01 2004-05-11 Kim R. Legate Motion picture editing and distribution
US20040103293A1 (en) * 1999-08-06 2004-05-27 Ryan John O. Scaling independent technique for watermarking images
US20040109016A1 (en) 2002-09-27 2004-06-10 Darcy Antonellis Motion picture anti-piracy coding
US6757406B2 (en) * 1993-11-18 2004-06-29 Digimarc Corporation Steganographic image processing
US6760463B2 (en) * 1995-05-08 2004-07-06 Digimarc Corporation Watermarking methods and media
US6778682B2 (en) * 1994-10-21 2004-08-17 Digimarc Corporation Redundantly embedding auxiliary data in source signals
US6845170B2 (en) 2001-01-11 2005-01-18 Sony Corporation Watermark resistant to resizing and rotation
US6920232B2 (en) 1996-05-07 2005-07-19 Digimarc Corporation Watermark encoding using arbitrary features
US20050273698A1 (en) 2004-05-19 2005-12-08 Bentley System, Inc. Document genealogy
US20060026431A1 (en) 2004-07-30 2006-02-02 Hitachi Global Storage Technologies B.V. Cryptographic letterheads
US7007167B2 (en) * 2000-11-22 2006-02-28 Nec Corporation Watermarking technique for scaled image
US7116781B2 (en) * 1993-11-18 2006-10-03 Digimarc Corporation Counteracting geometric distortions in watermarking
US7184570B2 (en) * 1994-10-21 2007-02-27 Digimarc Corporation Methods and systems for steganographic processing
US7295677B2 (en) * 2002-03-01 2007-11-13 Hewlett-Packard Development Company, L.P. Systems and methods for adding watermarks using network-based imaging techniques
USRE45406E1 (en) 2003-09-08 2015-03-03 Deluxe Laboratories, Inc. Program encoding and counterfeit tracking system and method

Patent Citations (69)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1235765A (en) 1967-10-25 1971-06-16 Micro Mega Sa Holder for tools, particularly dental tools
US5080479A (en) * 1990-07-30 1992-01-14 Rosenberg Stanley L Automatic implanting of identification data in any recorded medium
US5303294A (en) * 1991-06-18 1994-04-12 Matsushita Electric Industrial Co., Ltd. Video theater system and copy preventive method
US5251041A (en) * 1991-06-21 1993-10-05 Young Philip L Method and apparatus for modifying a video signal to inhibit unauthorized videotape recording and subsequent reproduction thereof
US6072888A (en) * 1992-07-31 2000-06-06 Digimarc Corporation Method for image encoding
US6628801B2 (en) * 1992-07-31 2003-09-30 Digimarc Corporation Image marking with pixel modification
US6459803B1 (en) * 1992-07-31 2002-10-01 Digimarc Corporation Method for encoding auxiliary data within a source signal
US6678392B2 (en) * 1992-07-31 2004-01-13 Digimarc Corporation Method for encoding auxiliary data within a source signal
US7062070B2 (en) * 1992-07-31 2006-06-13 Digimarc Corporation Image marking adapted to the image
US7068811B2 (en) * 1992-07-31 2006-06-27 Digimarc Corporation Protecting images with image markings
US5809160A (en) * 1992-07-31 1998-09-15 Digimarc Corporation Method for encoding auxiliary data within a source signal
US5315448A (en) * 1993-03-18 1994-05-24 Macrovision Corporation Copy protection for hybrid digital video tape recording and unprotected source material
US7003132B2 (en) * 1993-11-18 2006-02-21 Digimarc Corporation Embedding hidden auxiliary code signals in media
US6681029B1 (en) * 1993-11-18 2004-01-20 Digimarc Corporation Decoding steganographic messages embedded in media signals
US6757406B2 (en) * 1993-11-18 2004-06-29 Digimarc Corporation Steganographic image processing
US20030091189A1 (en) * 1993-11-18 2003-05-15 Rhoads Geoffrey B. Arrangement for embedding subliminal data in imaging
US6542618B1 (en) * 1993-11-18 2003-04-01 Digimarc Corporation Methods for watermark decoding
US5850481C1 (en) * 1993-11-18 2002-07-16 Digimarc Corp Steganographic system
US5850481A (en) * 1993-11-18 1998-12-15 Digimarc Corporation Steganographic system
US6122392A (en) * 1993-11-18 2000-09-19 Digimarc Corporation Signal processing to hide plural-bit information in image, video, and audio data
US7116781B2 (en) * 1993-11-18 2006-10-03 Digimarc Corporation Counteracting geometric distortions in watermarking
US5751368A (en) * 1994-10-11 1998-05-12 Pixel Instruments Corp. Delay detector apparatus and method for multiple video sources
US7184570B2 (en) * 1994-10-21 2007-02-27 Digimarc Corporation Methods and systems for steganographic processing
US6778682B2 (en) * 1994-10-21 2004-08-17 Digimarc Corporation Redundantly embedding auxiliary data in source signals
US5636292C1 (en) * 1995-05-08 2002-06-18 Digimarc Corp Steganography methods employing embedded calibration data
US6760463B2 (en) * 1995-05-08 2004-07-06 Digimarc Corporation Watermarking methods and media
US5636292A (en) * 1995-05-08 1997-06-03 Digimarc Corporation Steganography methods employing embedded calibration data
US5710834A (en) * 1995-05-08 1998-01-20 Digimarc Corporation Method and apparatus responsive to a code signal conveyed through a graphic image
US5699427A (en) * 1995-06-23 1997-12-16 International Business Machines Corporation Method to deter document and intellectual property piracy through individualization
US5680454A (en) * 1995-08-04 1997-10-21 Hughes Electronics Method and system for anti-piracy using frame rate dithering
US5859920A (en) * 1995-11-30 1999-01-12 Eastman Kodak Company Method for embedding digital information in an image
US6920232B2 (en) 1996-05-07 2005-07-19 Digimarc Corporation Watermark encoding using arbitrary features
US6018374A (en) * 1996-06-25 2000-01-25 Macrovision Corporation Method and system for preventing the off screen copying of a video or film presentation
US6005643A (en) * 1996-10-15 1999-12-21 International Business Machines Corporation Data hiding and extraction methods
US5743615A (en) * 1996-12-31 1998-04-28 Eastman Kodak Company Film slides having encoded data and methods for preparing film slides
GB2325765A (en) 1997-04-07 1998-12-02 Ibm Data hiding and detection
US6044156A (en) * 1997-04-28 2000-03-28 Eastman Kodak Company Method for generating an improved carrier for use in an image data embedding application
EP0899688A2 (en) 1997-08-29 1999-03-03 Fujitsu Limited Device for generating, detecting, recording, and reproducing a watermarked moving image
EP0899688A3 (en) 1997-08-29 2001-01-24 Fujitsu Limited Device for generating, detecting, recording, and reproducing a watermarked moving image
US5959717A (en) * 1997-12-12 1999-09-28 Chaum; Jerry Motion picture copy prevention, monitoring, and interactivity system
US6285774B1 (en) * 1998-06-08 2001-09-04 Digital Video Express, L.P. System and methodology for tracing to a source of unauthorized copying of prerecorded proprietary material, such as movies
US6529600B1 (en) * 1998-06-25 2003-03-04 Koninklijke Philips Electronics N.V. Method and device for preventing piracy of video material from theater screens
US6325420B1 (en) * 1998-08-17 2001-12-04 Inspectron Corporation Method for embedding non-intrusive encoded data in printed matter and system for reading same
US6354630B1 (en) * 1998-08-17 2002-03-12 Inspectron Corporation Method for embedding non-intrusive encoded data in printed matter
US6735776B1 (en) * 1999-02-01 2004-05-11 Kim R. Legate Motion picture editing and distribution
US6396594B1 (en) * 1999-03-31 2002-05-28 International Business Machines Corporation Method for providing flexible and secure administrator-controlled watermarks
US6558273B2 (en) * 1999-06-08 2003-05-06 K. K. Endo Seisakusho Method for manufacturing a golf club
US20040103293A1 (en) * 1999-08-06 2004-05-27 Ryan John O. Scaling independent technique for watermarking images
US6556273B1 (en) 1999-11-12 2003-04-29 Eastman Kodak Company System for providing pre-processing machine readable encoded information markings in a motion picture film
US7007167B2 (en) * 2000-11-22 2006-02-28 Nec Corporation Watermarking technique for scaled image
EP1217840A2 (en) 2000-12-13 2002-06-26 Eastman Kodak Company System and method for embedding a watermark in digital image sequences
US6845170B2 (en) 2001-01-11 2005-01-18 Sony Corporation Watermark resistant to resizing and rotation
US20020097870A1 (en) 2001-01-23 2002-07-25 Nelson Terence J. Method and system for tracing an analog copy of a digital work to a unique digital copy and a particular digital player
US20020168069A1 (en) * 2001-02-28 2002-11-14 Babak Tehranchi Copy protection for digital motion picture image data
US20030174769A1 (en) * 2001-05-10 2003-09-18 Takefumi Nagumo Motion picture encoding apparatus
US6624874B2 (en) * 2001-12-21 2003-09-23 Eastman Kodak Company Apparatus and method for inserting an updateable hidden image into an optical path
US7295677B2 (en) * 2002-03-01 2007-11-13 Hewlett-Packard Development Company, L.P. Systems and methods for adding watermarks using network-based imaging techniques
US20030187679A1 (en) * 2002-04-02 2003-10-02 Odgers Chris R. Methods and apparatus for uniquely identifying a large number of film prints
US20030187674A1 (en) * 2002-04-02 2003-10-02 Odgers Chris R. Methods and apparatus for uniquely identifying a large number of film prints
US20030202679A1 (en) 2002-04-29 2003-10-30 The Boeing Company Watermarks for secure distribution of digital data
US20040033060A1 (en) * 2002-08-14 2004-02-19 Qdesign Corporation Modulation of a video signal with an impairment signal to increase the video signal masked threshold
US20040033051A1 (en) * 2002-08-16 2004-02-19 Ip Kiril Kun Wan Method and system for producing and displaying visual presentations which inhibit off-screen duplication
WO2004030339A2 (en) 2002-09-27 2004-04-08 Technicolor, Inc. Motion picture anti-piracy coding
US7206409B2 (en) * 2002-09-27 2007-04-17 Technicolor, Inc. Motion picture anti-piracy coding
US20040109016A1 (en) 2002-09-27 2004-06-10 Darcy Antonellis Motion picture anti-piracy coding
USRE45406E1 (en) 2003-09-08 2015-03-03 Deluxe Laboratories, Inc. Program encoding and counterfeit tracking system and method
US20050273698A1 (en) 2004-05-19 2005-12-08 Bentley System, Inc. Document genealogy
US7742617B2 (en) * 2004-05-19 2010-06-22 Bentley Systems, Inc. Document genealogy
US20060026431A1 (en) 2004-07-30 2006-02-02 Hitachi Global Storage Technologies B.V. Cryptographic letterheads

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Neil F. Johnson, Information Hiding, Kluwer Academic Publishers pp. 28-29.

Also Published As

Publication number Publication date
US20060015464A1 (en) 2006-01-19
US7818257B2 (en) 2010-10-19

Similar Documents

Publication Publication Date Title
USRE46918E1 (en) Program encoding and counterfeit tracking system and method
USRE45406E1 (en) Program encoding and counterfeit tracking system and method
CN101273367B (en) Covert and robust mark for media identification
EP2036035B1 (en) System and method for object oreinted fingerprinting of digital videos
US7394519B1 (en) System and method for audio encoding and counterfeit tracking a motion picture
US7295281B2 (en) System and method for adaptive marking and coding of film prints
CN101558645B (en) Text-based anti-piracy system and method for digital cinema
EP1741057A1 (en) Watermarking of motion picture prints
US8171294B2 (en) Additional-information detection processing apparatus and method, content playback processing apparatus and method, and computer program
US7574004B2 (en) Image display method and image display processor
US20190051328A1 (en) Method and apparatus for tracking pirated media
JP2005122694A (en) Data content identification
CA2480487C (en) Program encoding and counterfeit tracking system and method
US20090123022A1 (en) Digital cinema projector watermarking system and method
US20100158308A1 (en) Digital Cinema Projector Watermarking System and Method
US7308430B2 (en) Methods and apparatus for uniquely identifying a large number of film prints
US7289644B2 (en) Anti-piracy coding of motion pictures
GB2415853A (en) Recording a coded identification number in frames of a moving picture
Kojima et al. Visible video data hiding techniques based on visual effects utilizing barcodes
JP2014512755A (en) How to hide and restore data in video stream
US20090161908A1 (en) Recoverable Marks for Films
WO2007142639A1 (en) Method and apparatus for tracking pirated media

Legal Events

Date Code Title Description
AS Assignment

Owner name: DELUXE LABORATORIES, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:DEWOLDE, JEFFREY H.;REEL/FRAME:034978/0445

Effective date: 20040619

AS Assignment

Owner name: DELUXE LABORATORIES LLC, DELAWARE

Free format text: CHANGE OF NAME;ASSIGNOR:DELUXE LABORATORIES, INC.;REEL/FRAME:035230/0067

Effective date: 20141222

AS Assignment

Owner name: PNC BANK, NATIONAL ASSOCIATION, PENNSYLVANIA

Free format text: SECURITY INTEREST;ASSIGNORS:DELUXE 3D LLC;DELUXE CREATIVE SERVICES INC.;DELUXE MEDIA INC.;AND OTHERS;REEL/FRAME:051521/0411

Effective date: 20200106

AS Assignment

Owner name: DELUXE ONE LLC, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:053102/0558

Effective date: 20200630

Owner name: DELUXE LABORATORIES LLC, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:053102/0558

Effective date: 20200630

Owner name: SOFTITLER NET, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:053102/0558

Effective date: 20200630

Owner name: DELUXE MEDIA INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:053102/0558

Effective date: 20200630

AS Assignment

Owner name: PNC BANK, NATIONAL ASSOCIATION, PENNSYLVANIA

Free format text: INTELLECTUAL PROPERTY SECURITY AGREEMENT;ASSIGNORS:DELUXE MEDIA INC.;SOFTITLER NET, INC.;DELUXE LABORATORIES LLC;AND OTHERS;REEL/FRAME:053265/0329

Effective date: 20200630

AS Assignment

Owner name: LOAN ADMIN CO LLC, CONNECTICUT

Free format text: GRANT OF SECURITY INTEREST IN UNTED STATES PATENTS;ASSIGNORS:DELUXE MEDIA INC.;SOFTITLER NET, INC.;DELUXE ONE LLC;REEL/FRAME:054153/0001

Effective date: 20200820

CC Certificate of correction
MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 12

AS Assignment

Owner name: DELUXE ONE LLC, CALIFORNIA

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:LOAN ADMIN CO LLC, AS COLLATERAL AGENT;REEL/FRAME:063237/0243

Effective date: 20230331

Owner name: SOFTITLER NET, INC., CALIFORNIA

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:LOAN ADMIN CO LLC, AS COLLATERAL AGENT;REEL/FRAME:063237/0243

Effective date: 20230331

Owner name: DELUXE MEDIA INC., CALIFORNIA

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:LOAN ADMIN CO LLC, AS COLLATERAL AGENT;REEL/FRAME:063237/0243

Effective date: 20230331

AS Assignment

Owner name: DELUXE ONE LLC, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:063213/0909

Effective date: 20230331

Owner name: DELUXE LABORATORIES LLC, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:063213/0909

Effective date: 20230331

Owner name: SOFTITLER NET, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:063213/0909

Effective date: 20230331

Owner name: DELUXE MEDIA INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:063213/0909

Effective date: 20230331